97cf26ec434fa09b189fd9460f6a39f8e9ccb95e6fd8628db0d9e9b0a4c9b35950cc51199d29e93f9a8a0fa8732a50b153d4e3823413986fa1720e8fa18255a7051d99581873265e593b4fbf104c04986c6e9792e1f42cea1f76055ea139c48e98d3d885303cede7cfc8e28bb886915925d4c04f3fc8733bd7b9b33e004610f3a595d8cbc0a4400b9740183cfc2d203d9bb3cccdb4ed9a0e6", 0xae}, {&(0x7f000000af80)="1d2784959d1400633328f9c3f842ad6b748c009c10def331d443b9b840d4bf69d804f04f9837bf9fe7b9b9e8f7a34235c84f186121683e9c098d91e9cc1ae539a707934ec7fef25410dc60877844ff71741e3480cde2196b4cf8073b15ba263e49ee049d57a8b2446e4f7f11258969bb5780b09afcf86cf4c8806f528727ef5299f33af76ff0b57a1e893f61da807d2361f9c0da111a24bb", 0x98}, {&(0x7f000000b040)="1312fc837233f59bb30c468fada0b0d7a6252772d8408ed4a326cfcf44c4f2834953666fadb91bf5ac08a756bf4a04dd2862c245de40d96349452e0914b5d13260db6c1811a69eda6aba320ccd8d655a97359b4390b6ade2026706564c6c4cde17e1edd7eced2ba3587c609919b8b0b117f8c0cc4e038d9ab0b984e93068477f5f69ed7ce2de570fe44212c4dfbe8360e14902baa2c8a5518bf3b112f2bf0192c8f167a70e2cdcc4064ae1cf817080d645198191b74c3d521c926aa14aadcfa09702852429756e7ed13cdd1646d6b59125975d70f87996", 0xd7}, {&(0x7f000000b140)="87a1a6f24b4373f341ee2dcf", 0xc}, {&(0x7f000000b180)="ce347a1c36370f1e7109d63f821dbc8590338adc0b8b0bc91b9ba0c77fcfe1411b4842dbc7a4747420c1ca83f7c476ea4edb4507d04f42abe992cb4958b92e1e1f193e9379bffc35d350fad0a45dba8349d43c3cbdd12db936005e502bdb0ef8550a40a2e654642c087c679f444baaefa8096b2f0fc6ec55ae55843ea9dc085254419bd8d39eb1c3ab96e8c8f1ae742a1e65dac739fb7e530e5815b6619fd5843df60d3d333625fb5bf715386b476da1418e17b8dc45b61d5de4369ba72ab58be4513ecffc03024b3cf2ea77d1fee09dc287adaad04a20bd62051aafdfd1d2ef3193ced473a79398d9b0f098b6760a8e", 0xf0}, {&(0x7f000000b280)="eb8a906dd1f957c748fc6ae63e8c", 0xe}, {&(0x7f000000b2c0)="60ac333a173677b67de83ea8580cd083a9c821db3857427d46166c838382879ab86c12830e1b0c15e6b34fae2335b48fd3cedf8a2e46ff1371fb61cd93001fb35750606835534e22ca09532a168c0d0713e811845cc2a394c3de542974fe4e5bc6fc320739b423c049ebb5201379c6b462be6777288bee9a95e0ffb63637b70be0e66d117c212ec5cd", 0x89}], 0xa, 0x0, 0x0, 0x20000000}], 0xa, 0x80) r35 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_RUN(r35, 0xae80, 0x0) 03:40:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x3) 03:40:11 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x6c000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:11 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x100000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:11 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xe, 0x2, [@struct]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:11 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x74000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:11 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:11 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x200000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:11 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x64, 0x2, [@struct]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x5) 03:40:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x1a1141, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000100)="0fac4a828c66b8e84500000f23c00f21f86635010004000f23f82e0f01ddbaf80c66b80e97a78a66efbafc0cb081eef26b6700000fc72e0600670f0683550e000f01c966b92703000066b82200000066ba000000000f30"}], 0x1, 0x3, 0x0, 0x188) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:12 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x7a000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:12 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x300000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:12 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x3fe, 0x2, [@struct]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x6) 03:40:12 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xb00, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:12 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0xff0f0000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:12 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x400000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:12 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x5f5e0ff, 0x2, [@struct]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:12 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0xff600000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:12 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x500000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x8) 03:40:12 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x131000, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f00000000c0)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:40:12 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xc00, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:12 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x7ffffffff000, 0x2, [@struct]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:12 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x400000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:12 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x600000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa) 03:40:12 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x700000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:12 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@struct]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:12 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x5555558fa000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:12 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xd00, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:12 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x800000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:13 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x900000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:13 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) read(r2, &(0x7f00000000c0)=""/173, 0xad) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) write$FUSE_DIRENT(r3, &(0x7f0000000340)={0x138, 0x0, 0x6, [{0x1, 0x0, 0x5, 0xffffffffffffffff, '(user'}, {0x6, 0x1, 0x1, 0x3902, '/'}, {0x2, 0xfffffffffffffffb, 0x9, 0x80000000, '/dev/kvm\x00'}, {0x2, 0x9, 0x9, 0x5, '/dev/kvm\x00'}, {0x6, 0xfffffffffffffffe, 0x9, 0x100, '/dev/kvm\x00'}, {0x3, 0x800, 0xa, 0x10001, '/dev/null\x00'}, {0x4, 0x8, 0x4, 0x0, 'ppp1'}, {0x6, 0x86e, 0xa, 0x67d, '/dev/null\x00'}]}, 0x138) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_HYPERV_EVENTFD(r3, 0x4018aebd, &(0x7f0000000080)={0x4, r1, 0x1}) remap_file_pages(&(0x7f000001f000/0x1000)=nil, 0x1000, 0xc, 0x8003, 0x400) 03:40:13 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@struct]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd) 03:40:13 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x55555591c000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:13 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xa00000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:13 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:13 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x1001, [@struct]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:13 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x60ffffffffff, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x10) 03:40:13 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xb00000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:13 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x400001, [@struct]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:13 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x760000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:13 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='memory.stat\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8913, &(0x7f0000000080)={'lo:\x05\xe6\xff\x01\xff\xff\xfd\xfd\x01\x80\x00\x00\x01', {0x2, 0x0, @broadcast}}) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000440)={0x4}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r3, 0x4040ae77, &(0x7f0000000180)) r5 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{}, {0x0}]}) ioctl$DRM_IOCTL_DMA(r5, 0xc0406429, &(0x7f00000003c0)={r6, 0x1, &(0x7f0000000140)=[0x56], &(0x7f00000001c0)=[0x0, 0x2, 0xfffffffffffffffa, 0x1200000000000, 0x1f], 0x10, 0x3, 0xfffffffffffffffd, &(0x7f0000000340)=[0x7, 0x100000001, 0x10001], &(0x7f0000000380)=[0x9, 0x74, 0x8, 0x9, 0x8, 0x8c44]}) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000480)={0x0, 0x5, 0x6, [0x7f, 0x6, 0x7, 0xffffffff, 0x81, 0xe0]}, &(0x7f00000004c0)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000500)={0x8, 0xffffffffffffffff, 0x8003, 0x0, 0x9, 0x4, 0x2, 0x3ff, r7}, &(0x7f0000000540)=0x20) 03:40:13 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xf26, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:13 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xc00000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x12) 03:40:13 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x7ffffffff000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:13 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x2}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:13 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xd00000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:13 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1b) 03:40:13 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x3}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:13 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xe00000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:13 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x960000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:14 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40800, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:14 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x1100, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:14 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x4a) 03:40:14 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x10002000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:14 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1000000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:14 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x1200, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:14 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1100000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x4c) 03:40:14 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x5}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:14 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x60710000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x4e) 03:40:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) accept4$tipc(r3, &(0x7f0000000080)=@id, &(0x7f00000000c0)=0x10, 0x80000) 03:40:14 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0xa08f5555550000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:14 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1200000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:14 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:14 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:14 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x1a00000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x50) 03:40:14 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:14 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x2500000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 769.393061][ T8248] __ntfs_error: 35 callbacks suppressed [ 769.393072][ T8248] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:14 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0xc0915555550000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 769.528166][ T8248] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x55) 03:40:14 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x8}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 769.616946][ T8248] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:15 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = fcntl$getown(r2, 0x9) getpgid(r3) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:15 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x4000000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:15 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0xd0700000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:15 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x66) 03:40:15 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x9}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:15 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x4800000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:15 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0xe0500000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 769.937495][ T8294] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x68) 03:40:15 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xa}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 769.981742][ T8294] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 770.087920][ T8294] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:15 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x20000, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) fadvise64(r2, 0x0, 0x4, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:15 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0xf0ffffff7f0000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:15 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:15 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xb}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:15 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x4c00000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x6a) 03:40:15 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x100000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:15 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x6800000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:15 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xc}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 770.436656][ T8333] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 770.535402][ T8333] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 770.549077][ T8333] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:15 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x200000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:15 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x6c00000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x73) 03:40:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:16 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xd}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:16 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x2500, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:16 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x7400000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:16 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xe}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:16 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x300000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x79) [ 770.925243][ T8370] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:16 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x7a00000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:16 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x10}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:16 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x400000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:16 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xff0f000000000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:16 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x260f, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:16 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20000, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2100008}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, r4, 0x30b, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x400}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x101}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040}, 0x840) r5 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x200000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r5, 0x29, 0x44, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r5, 0xc0286415, &(0x7f0000000140)={&(0x7f000002d000/0x2000)=nil, 0x834e, 0x0, 0x4, &(0x7f000002a000/0x2000)=nil, 0x8}) 03:40:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x82) 03:40:16 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x500000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:16 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x11}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:16 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xffffffff00000000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:16 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x12}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:16 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x600000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x8b) 03:40:16 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:16 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xffffffffff600000, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:16 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x700000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:16 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x14}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:40:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x8e) 03:40:17 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:17 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:17 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x800000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:17 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x25}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x97) 03:40:17 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x900000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:17 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x4, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:17 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x43}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:17 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:17 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0xa00000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:17 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$VHOST_SET_VRING_ENDIAN(r3, 0x4008af13, &(0x7f0000000080)={0x0, 0x400}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa0) 03:40:17 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0xa, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:17 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x48}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:17 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0xb00000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:17 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x3ee, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa3) 03:40:17 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:17 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4c}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:17 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0xc00000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:17 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x3f3, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:17 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x12000, 0x0) ioctl$CAPI_CLR_FLAGS(r0, 0x80044325, &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e20, @empty}], 0x10) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000100)) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f00000001c0)={0x5}) finit_module(r3, &(0x7f0000000180)=')/\x00', 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:40:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa8) 03:40:18 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x68}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:18 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x3f4, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:18 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0xd00000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:18 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x4c01, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb1) 03:40:18 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x3f5, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:18 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0xe00000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:18 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6c}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) r3 = accept$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x2, 0x0, @remote}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)={0x0, 0x20}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000300)=@assoc_id=r4, &(0x7f0000000340)=0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) fcntl$getflags(r3, 0x40a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:18 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x5601, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb6) 03:40:18 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x1000000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:18 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x74}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:18 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x3f6, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xe0) 03:40:18 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x1100000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:18 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7a}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:18 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x5701, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:18 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0xffffff1f, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:18 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x129, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:18 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x300}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xe2) 03:40:19 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x1200000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:19 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x2, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:19 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x3, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:19 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x5c00, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:19 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xe4) 03:40:19 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x500}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:19 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x2500000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r2, 0x80040040045010, &(0x7f00000001c0)) ppoll(&(0x7f0000000000)=[{r2, 0x40}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:40:19 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x4000000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:19 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x5, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:19 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:19 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x600}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:19 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x4800000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xe6) 03:40:19 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x6, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:19 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x700}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:19 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x4c00000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xeb) 03:40:19 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x7, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:19 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x8000000], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:19 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:19 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x900}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:20 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x6800000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:20 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x8, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 774.640238][ T8704] __ntfs_error: 32 callbacks suppressed [ 774.640247][ T8704] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xfc) 03:40:20 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xa00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 774.769002][ T8704] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:20 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x6c00000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:20 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x9, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 774.837129][ T8704] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xfe) 03:40:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x100000000, 0x101, 0xff, 0x0, 0x0, 0x0, 0x1, 0x8], 0xf000, 0x20000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffff9c, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="3058d0234b752f9a287de051860f7fb44abda4fa25000000", @ANYRES16=r3, @ANYBLOB="00012cbd7000fcdbdf2503000000080001000000000008000100000000000c0003000300000000000000"], 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x10) 03:40:20 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xb00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:20 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x7400000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:20 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:20 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xa, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:20 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xc00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x109) 03:40:20 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x7a00000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 775.191051][ T8736] set kvm_intel.dump_invalid_vmcs=1 to dump internal KVM state. [ 775.244471][ T8751] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:20 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xb, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:20 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xd00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 775.309915][ T8751] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 775.338667][ T8751] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:20 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0xff0f000000000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:20 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xc, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:20 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x10f) 03:40:20 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:20 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0xffffffff00000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:20 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xe00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:20 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xd, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x118) 03:40:21 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0xffffffffff600000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:21 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xe, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 775.802557][ T8791] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:21 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1100}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:21 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x8000, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000100)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000080)=0x100, 0x4) [ 775.872019][ T8791] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x121) [ 775.943423][ T8791] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:21 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0xa, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:21 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x10, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:21 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:21 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1200}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x124) 03:40:21 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:21 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x11, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:21 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1400}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:21 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x2, 0x1190c1) write$FUSE_INIT(r1, &(0x7f00000000c0)={0x50, 0x0, 0x8, {0x7, 0x1f, 0x8, 0x1202000, 0xfffffffffffffff9, 0x7, 0x1, 0x7}}, 0x50) syz_emit_ethernet(0xd7, &(0x7f0000001c00)={@broadcast, @random="274f01a00242", [], {@x25={0x805, {0x0, 0x3, 0xb, "07d4bcc2d02f830475efddaf44975f1a81aaada60349b3f35a05de1237f61bc18c4fea2cc503f628f75794b2f3fe4406253f84d20111a21d99ac44082529244e536c21a60494bf1feaac1b0565b3a5db130fc86fa8059aa80a08be74421ec3311a909d6ef3b0c972e7f21caf3daddeac69d9d2d423764f808626859fd29bed56cbdcb241b6975f3ec15d9a4f3c4cf96ab54cc84bd592114132919a909458f8563b3a9f815d3f5a32ddd07c47d29b4be80583d8b323ff971cafc7f1b4af606d0c696af3457fef"}}}}, &(0x7f0000001d00)={0x0, 0x1, [0x850, 0xfb3, 0xde9, 0x87f]}) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r2, 0x4010ae68, &(0x7f0000001d40)={0x100001, 0x4000}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000180)) sendmmsg$sock(r1, &(0x7f0000001b80)=[{{&(0x7f0000000340)=@pptp={0x18, 0x2, {0x1, @loopback}}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000140)="97e043", 0x3}, {&(0x7f00000003c0)="4fad7eb4fec5ead9a969fe63093f40cfd7c91eab4cfa44834cb4844dc5307c5af76045167304f3a6f1ea55b0c0de468ee489c3e8be8c67d5171ff4122cd57cf487f2976d467af55e703ff3f6752f0b5777e6a93125c4a62bc34a3efe545b48a801ebfd16576f077f7bd98d74601b6c75b48c9ee94353454b32f908221c4a19a283635a664000c5", 0x87}, {&(0x7f0000000480)="b5c6d9fe4d066fca221d0cbff8b22b71a8b864afa0975578161e9b96acf7a3288e3d3b8e23b5a3f0605525cb1bec03a1a0684e70f691a89ca25083368923663b6f3c5389bdd241ec569708dd3227474d2ef2d8c8a4e00381e212f120c30f0a0e416bec134c51984ac50dce0e13be4368affc003a5f482fbd7852707e5222fb0c0fd7479f51fceea0bc78924b818084c7829a6c61da4800a4dc3179a5d98017c22a0d34e0ee9c9bc9d5e560cd6eea4360b3cfd0f72595bc362060b9fe414aee72a1a45d5aee2eaf43f742b0f56021b170b0bc195b99", 0xd5}, {&(0x7f0000000580)="913f9eb96438d6a647b2ac9b441d573624333d9d147e8ed84fbd0f88994dc73b9c2c9d8d11ea4558a913729f68d2f64f966e0898d1e91193518ff70554a343221295074419ff78da82321fc677cec2fb225498bc01e88d63cf2e99462680e77ec2b24391d6a3fa6218a04c75e81f42423580f8738be4dba3", 0x78}, {&(0x7f0000000600)="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", 0x1000}, {&(0x7f0000001600)="832805a57c155725309893aee9e71feda35216243815d429fe141d94de6e41c5dc0c789ee27e5921e9f1d8c1a6dbc439e99da620afa6bde69cc5d6dd859fac54386e7f719fe41743f4bc96bdf98e79d27d499501858e120f0caf018bc8c79e0401903f1321241c56bdaf1bf2899481b0454ec3549de9a2a152c370ac3fc05d4dcee7", 0x82}], 0x6, &(0x7f0000001740)=[@txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffff8}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x10000}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x81}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}], 0x90}}, {{&(0x7f0000001800)=@llc={0x1a, 0x305, 0x0, 0xffffffffffffa046, 0x6, 0x1, @random="0599b757fcaa"}, 0x80, &(0x7f0000001ac0)=[{&(0x7f0000001880)="04927190bfb0420bd1dcd740f7ed5cabac294c277a6dbac89dea0e0e5e3bd4ad4256f2e720fcdc80f0d0127823572072beae85afa9adb9b0f62f2c2da5a9018ddf6f892c3d86fd4b8d24d1a974eba256fcf5b78d597db90a6ce3", 0x5a}, {&(0x7f0000001900)="c152c10e13e0299e9cf121fbf607ee073c4f3677e5224051eeac15bd68662f65d1509b1b1da6aa7bf6ce17b3e443a6dec7d7b67730a8316f1aed16805e1102335f730c7185f90cc25fc4990d83184899fad4cd0d5d238dd755fab8af0d6062a0b9b3d834b9d3716accea566c925c8878d86ab5e9a7f0e549637b385b9378960fee7fdd2574466fbc8d32536d63e9ceef", 0x90}, {&(0x7f00000001c0)="311b6f0dbed6c4b49290e15d94339e88511e54bfc21140b65ef9ea24b72a", 0x1e}, {&(0x7f00000019c0)="8702184768ac00296e27ddb9ea1d48957e0bbc347f474790126001f4fd12167a8a74e757f236a5b9ca60fe3c904225defe82a36ce2500e5df4972c99682d881e0daf426dbda00a1bdbb84f5033ff3f8daa59b6bb86e29b17764197c63f1374e9ca20b9badf4df04b212be42b87ab06c718a227", 0x73}, {&(0x7f0000001a40)="02646debea576a76ccb17243d6420ea5b8fed3d2e6f9f4ec10cb4b5aa6458dafcb85c224ed0eacfe558acaa6e3fd9a216b75d1bd02e6401a8474ca44c052ae3280585b6298d01f2a52bc4b", 0x4b}], 0x5, &(0x7f0000001b40)=[@txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x18}}], 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x1, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:40:21 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x64, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x12d) [ 776.397164][ T8837] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:21 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x12, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:21 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x5f5e0ff, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:21 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x2000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:21 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xa802, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x136) 03:40:22 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1a, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:22 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:22 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x2500}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:22 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x25, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$KDSKBMETA(r2, 0x4b63, &(0x7f0000000340)=0x20) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r4 = dup3(r0, r3, 0x80000) write$FUSE_GETXATTR(r4, &(0x7f0000000080)={0x18, 0xffffffffffffffda, 0x6, {0xff}}, 0x18) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r5, 0x7, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000480)={0x0, 0x5c, &(0x7f0000000400)=[@in={0x2, 0x4e20, @loopback}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e23, 0x0, @mcast1, 0x6}, @in={0x2, 0x4e23, @multicast1}]}, &(0x7f00000004c0)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000500)=@sack_info={r6, 0x3c, 0x3}, &(0x7f00000003c0)=0xc) setsockopt$inet_sctp6_SCTP_RTOINFO(r5, 0x84, 0x0, &(0x7f0000000140)={0x0, 0x2, 0xfffffffffffffffc, 0x6}, 0x10) 03:40:22 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xa902, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x139) 03:40:22 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x3, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:22 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:22 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x48, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x13e) 03:40:22 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:22 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4300}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:22 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = socket$inet_smc(0x2b, 0x1, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x200, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:40:22 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:22 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4c, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x147) 03:40:22 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4800}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:22 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x68, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:22 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x5, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:22 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xf701, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x14c) 03:40:23 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x6, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:23 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x6c, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000840)='/dev/null\x00', 0x0, 0x0) sendmsg$inet_sctp(r3, &(0x7f0000000800)={&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x1c, &(0x7f0000000780)=[{&(0x7f00000000c0)="568dd7ef4da4c03305d302e5c89ef30b27c52427c18a855a84e731a69939c8ceab77f43e0052bdf2fba6015a71bd087031682b455d7a587e44b166335d0a898620d618903153e118a03389cbda46840ba064d9dc9d374555f08b73579476093b35baf8643e3b2a372aa758359678e19693e88ce2e1208276c013752db6714ae4fcad237cae6ae5e5", 0x88}, {&(0x7f00000001c0)="115e3be4a1b1641ec0415265d5df8cfdfe9ab4063b3400193cd84459d8bb8fd54bd94732389bad922d32092a16b2dd2c44", 0x31}, {&(0x7f0000000340)="ed274d471fc4af4e1539d9fad3d3b08b6d2e4b3542da88670d397b8bb99c14f833df94940ae346b72cf311bdbe80c0755363cc8bd7f20619bfa797bad8d9ae2420841738196237b048dd8761efa5cb7c0609d9080bbc9cec169cc84de16291e745baf3cfd460c5c57c53ecb5bc2782f5c070a0a46add7ddff3ab184fe631116efa51403801dfb870cca9b8476d87c9c76a1906fe922c160448f9e0f693ffc6839d14c2c0b0bc1ca91ebe287ca885ba167871ff782c5e001c409b1525657494c356a529085a5db3fc5b091f4d0968bd0cf977ed0cdb7070403bbce474e0352b1bec", 0xe1}, {&(0x7f0000000440)="090c2c8ea480eb4ae0f694b62f9808aafc6eb932c5916fc80dd23dfd4a4837bc1764c0c3bbb22c709ff75a99c720ee4d52969da0345306b846fb58ff73cb2a4e52311dfe5dffa26640fce75f39c15302b7a87690e30cc62d07d87c92fa594e5deb3db7980abfc61183585733606cd8024d0c044b8ef323f72f0985bbc8059d8b9ff2a2b13c40c24e96f1635fa686476f1e1cf9e4821dfafb87915b600bbff1a708d797bcf9794f62bdceffda1645c701fcd5be1a8b7f58ffdf867d511df7f0f54c36ed4a0a", 0xc5}, {&(0x7f0000000540)="bf31f2d2ab6239e9813a41762e05efcf15e14d89c1f0653d787e1bf318e79d7096237c05f4bfd06f65d4b532400d6f53ab13f2442ccf8f7d3e2e5289e06f46af4f26b936bc50b91b624152817f2ff343df5600cfebea916de83898f15d6de9a45f86b4d49032d5199e38e73683ce285a2711413e9675436afbbc7c82fa8584171782e0fab0d7e9eb8fa597f2dee9fca000f403229339db90dbfb014f4c72e111074e0ab42ea7ec7c90f467cd4ae8eb0aa4cf39445baeb4f7c6fd5b1a8568eef6cbdf94f2e913", 0xc6}, {&(0x7f0000000640)="285ab0ebb7cb7ceaabe9963e3a1a525264d326d794dbb97c4706afc4d74ac9990ef156639034273b6bf31f5f2e7de163338506f713e148a5ab02845af7fffcb2e82303e7d269dd295018378d9e320d4a46ffbdc91abbabf698d70efa6194cf1af65e0f9e31", 0x65}, {&(0x7f00000006c0)="a891775735f7d14e1d4482dbf954ddda75da5c5d33cd22aa55329b83c166d9ae16aa574b7e1069d77fea703fa7ab9cc8996d7940ea62bdcbe855d88c72924f19f3490b7aba3b2f7651344240a21c31c2e41d3ab584821edb6cfdb73fdef9644d429dccdaef9cf3f8bc333c72c934dd9795ab33bb9ce3d8fe942ec7e0bb3beee4454c55fd656303e150b7228076598b01fe6901644afb068e649e906d8b2135f223", 0xa1}], 0x7, 0x0, 0x0, 0x40000}, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:23 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4c00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x176) 03:40:23 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x74, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:23 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x7, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:23 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x60ff}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:23 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:23 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x8, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:23 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6800}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x178) 03:40:23 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x7a, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:23 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$RTC_AIE_OFF(r3, 0x7002) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmmsg$sock(r3, &(0x7f0000003140)=[{{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="f8e2cdeb099da7b2b35789ee93f452a083a8bc1e36f3a60c38d00233f8346358c6f8534e291a58979f3db77e87250aa1e855b9846892a318f518752e76c17e16232f69a628da3ce6db6dc029e3297295f9", 0x51}, {&(0x7f0000000100)="29a0032c84754fb0f6c844b428490a4401c04d2df5de27858e498b0778591d930aff344a3db26b660c13349765961d4c09cb1096868b35ca609a75991add88d27f013cc9873bf1a9d180", 0x4a}, {&(0x7f00000001c0)="ff76a8b4f6c30ae69915f1a338b7d31d90dfa800f232a97405a1ac2e1e007cf49f5c332218cefc19412a13afca319cad09a8f48fc52a6e1ef1e50134", 0x3c}, {&(0x7f0000000340)="d7fa013f2ff7c94983047be812d6f0e61d50dec4d9e7c8490585160f260bacb823eef9d92760b4fd6a0217b67d928b4400bcba18b5a2ac990816e8bd16ce6045bfe3d63a009a272c132fe3e47b9de066dc21f0534bdb027c9b870f215bb07623d875f4ec92b3d8a3d6bf3331da6d5955251d90fe7642d19af67a9ef7ad84d2040c5073c11c78be48ae606ea48dd03d1f10867dd866ac167fc8789f8d5e3d5f355ec4d82efde17e1eba7c5a1702d5ada110a6817f0ad4b4656f", 0xb9}, {&(0x7f0000000400)="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", 0x1000}], 0x5, &(0x7f0000001480)=[@mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}], 0x60}}, {{&(0x7f0000001500)=@generic={0x0, "e05a1cb239076f70ea1acc3b6ddca130469f8f3b0ac4716398d20fbc94530086492f2d7fc39c2cdf7bece731e966b545221f8be210662ac18b7d5504d1126cd8f4e528a063b89d2ba7d7d52998ec6e3e485748120571524038a43be6c330ed4ca98e9fc626e2969c231f6b13f80df154e6f439ac8b655552a2ebb5115e1c"}, 0x80, &(0x7f0000001a40)=[{&(0x7f0000001580)="b8b435d3f864e6a2e1672ba45b2f67b19bbfd229d6bb08a63a57b8f4669ec9f9fe84d91daf2fe4e70e26b88910d22c35b2b89b19c8c5a85038f1159de90b61baea4baf55f566d57a7421d04619dad3dc9ccbe0de4e5113a55dc1e0cb747e2f5a2bb4ce88f0a8633b00be7e1973a11119fa76bbda6d53755af105bf910b860891a1b6f0fb009ac6e221328e5b568e4cb210c1229b966470bcb647205da8a2bd190bc12b7c4f8b568805350c553c6b763cdf3bbbffa69e6b239b672c4e6ef8cf676ea707e61a396e14f5a2c530666516546018aac3ff7f", 0xd6}, {&(0x7f0000001680)="452e8f1a5bc49750e1698c348f5d80eeaee4267b1fb08d7760ce7aa13df94d58f0de107fcb958d23d51b362bf7daab9b5aece7a1bae4ebe8882d057cca4b461882", 0x41}, {&(0x7f0000001700)="c3ecacea838508ace37b615d941da6800f58af3965d0e047779384ed7490e93f58f937b06f1bc9058e559c8ad4d4a4062e2ef2191f1833731a89ddd51ce11f177cba093873ad9a66a5983223579624b9620d7450583f284a6b29c96c2963e164c930245d3ae27510f1eb44c9bc87a3b8f8a5159eb171ae62bb4eb9885fcaf4aabf0d6b4c34c5e8d5838bf4e21eaa8cc452ec3f6a07ed49ca5fa856662ccbcc21dea910ea49288974", 0xa8}, {&(0x7f00000017c0)="7976c1f8faa7255a401e884ed47b63b361e69b3411c181c88d67881aae1a4cc8341ee65ed5b9eb00a11453cc24079f1a1441af6b6fab4d2f51148dadf68d252a37bfa624329f56789d89ffdcc1a84ddf7dadc6c5dc87e2844fa02658ac549f75df04f1034d000cffb25cd6c640501e62258e8169500fae1fd51cfc6c0367e3", 0x7f}, {&(0x7f0000001840)="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", 0xfb}, {&(0x7f0000001940)="110ab4fd89019d2680a3969d", 0xc}, {&(0x7f0000001980)="3c965b0be5b065c1b57ade4cf065469ddec1e78e7e5b0d19ed70d45370dae3a0d4ee0a0569003b2b19d94f134967d1d0a967a682cc0c1c319571c90abc67ebb341ac800ef1cdadc9af53f7c25a399055ccf80a83609fdd0dccb07a817a809e150adebc77bc608987d41ce5c778b9d21b4c404ce8a3811868fe6f3360da491bf608d278c7ab089e5655de681b3587c82e0b970bdcc0c52418d77882de7b433655e6e4afe5ecb0d0c9c0c64f98d8a20a13b920bae1", 0xb4}], 0x7, &(0x7f0000001ac0)=[@mark={{0x14, 0x1, 0x24, 0x1000}}], 0x18}}, {{&(0x7f0000001b00)=@caif=@dbg={0x25, 0x2, 0x5}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000001b80)="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", 0x1000}, {&(0x7f0000002b80)="0063a52322e830830424c40de9ffeb8d0455dae5c457ad340eb6e776bd5e6a956f8603910856a94706f79a81cccad7ae745be84c2791a4a598df840707533dc02802c959158b411bc5ce1e040f1935a7efb6875a928b46017b4264052fbf092901d23ce0ec2eedfc65a1edec5117164379073db041ff202679ff1bb795743db298e9d558f058484ce32a5e46ba0dc56350a48c50e044c2022854a189e5f402187a01e1d55943f5bab4c42fcd468bef9d150d3074adad63636c4fe61d212b", 0xbe}, {&(0x7f0000002c40)="8b2eaec8c9027e54055a98305e6381c441ffdf0f7f1e3e0b17e632a4ca49f8e04a0331f99d4868a7946f7ab14742f76cb4f9bcee6c98f76c72c2dd78acc0f315b8494441dbc79aad49c1c893077e3037fb4aa75f4909a9d294d018bde43fa525fcaf65d7d209d2593ca677777c8cca4e98d290e9db70d0e2", 0x78}], 0x3, &(0x7f0000002d00)=[@timestamping={{0x14, 0x1, 0x25, 0xf9}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}], 0x30}}, {{&(0x7f0000002d40)=@llc={0x1a, 0x30f, 0x5, 0x8000, 0x7, 0x0, @local}, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000002dc0)="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", 0xff}], 0x1, &(0x7f0000002f00)=[@mark={{0x14, 0x1, 0x24, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x8}}], 0x30}}, {{0x0, 0x0, &(0x7f0000003080)=[{&(0x7f0000002f40)="485e686a509815a9c1a5fe166601a9bdc3d98d503a62a50c9aecd763fa2663e77064cb880a04a343619e710902f7aef453a38fc61dc2aeb40766777da9fab5d2cbbc79faf2666cd34e34cf7592c661329ba261bd1d2412137037ac0df36ae8722bc35c85f324d6f9ac213c5a2f16cd90a3ac27a6a38813", 0x77}, {&(0x7f0000002fc0)="8153e0cec0e4b69f89a6faf904a6a78347fc5fca2a35947728401bc4cb6f457ddc6e1a2b5773bf31ceec85727f2770c5fde144f3cb7ede860534f6066c72285c524fa804f33cbc0827f2aaca4c4b5a97767c1ff1837ffb6c09f50763a525486fdaca1a32fc47802ed9250bf6c2", 0x6d}, {&(0x7f0000003040)="df9ed58c3f9a94f797", 0x9}], 0x3, &(0x7f00000030c0)=[@txtime={{0x18, 0x1, 0x3d, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @mark={{0x14, 0x1, 0x24, 0x3}}], 0x48}}], 0x5, 0x1) readahead(r1, 0x3, 0x20) 03:40:23 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x9, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:23 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:23 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x300, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:23 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6c00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x17a) 03:40:23 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xa, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:23 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x500, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x17c) 03:40:23 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7400}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:24 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x14c0000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x90002, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0xfffffffffffffffc, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TIOCSBRK(r4, 0x5427) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:40:24 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xb, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:24 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x600, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:24 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7600}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x181) 03:40:24 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xc, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:24 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x700, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:24 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:24 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:24 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7a00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x192) 03:40:24 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x900, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:24 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x8, 0x840) r4 = open$dir(&(0x7f00000003c0)='.\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file1/file0\x00', 0x0) renameat2(r4, &(0x7f00000002c0)='./file1/file0\x00', r4, &(0x7f0000000300)='./file0\x00', 0x2) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f00000000c0)={{0x51f, 0x7ff}, {0x0, 0xecee}, 0x401, 0x3, 0xfffffffffffffe01}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r5, 0xae80, 0x0) 03:40:24 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:24 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x9600}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:24 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xe, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x194) 03:40:24 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xa00, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:24 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x10, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:24 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xff0f}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x196) 03:40:24 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xb00, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:25 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:25 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x100020}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getsockopt$MISDN_TIME_STAMP(r3, 0x0, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:25 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x11, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 779.789754][ T9128] __ntfs_error: 29 callbacks suppressed [ 779.789763][ T9128] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x19f) [ 779.841327][ T9128] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:25 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xc00, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:25 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x12, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:25 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x400000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 779.947637][ T9128] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:25 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xd00, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:25 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:25 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x25, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1a5) 03:40:25 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x50e000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:25 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x288840, 0x0) ioctl$GIO_UNIMAP(r3, 0x4b66, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{}, {}, {}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:25 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xe00, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 780.244297][ T9167] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:25 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x48, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 780.314176][ T9167] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:25 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x607100}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:25 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1100, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 780.407633][ T9167] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1ae) 03:40:25 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x4c, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:25 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:25 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1200, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_mreqsrc(r1, 0x0, 0x2f, &(0x7f0000000080)={@local, @initdev, @broadcast}, &(0x7f00000000c0)=0xc) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r1, &(0x7f0000000400)="dd993adcde131d08b20c6d0ef8948b5aeca71ccfaa6a15fa0181f6387d810f604f1cc6eaa489f1b5f677d9be2b317841cf0db2ca42c32efa18abcea99f71108f48e0cdefb473a08022e68d3272cc90daf1406ee05fc4ce0b5e4adf4b2706d931e0dfdc300eabc18ca5c28db20774a4effc66a4746342d7112896528fffcc5f1ee54e8fbf8ad937b9876b35650733b98e05ce2a560071f98d3a3304e5cf4bcaf20c9cd4ff65d2c9390efa653b37b5a1ae8f6ec94e6cc3a8fee9a7e3d9ab06174adeb7787f2aa170ab6904ebb29acd65c0a629990447bda6f049c46bf426", &(0x7f0000000140)=""/55}, 0x18) syz_kvm_setup_cpu$x86(r1, r1, &(0x7f0000015000/0x18000)=nil, &(0x7f0000000580)=[@text32={0x20, &(0x7f0000000500)="b9c90800000f3266b842000f00d866b894000f00d00fd146000f231bf30f10aa008000000f01c9b9cd020000b861a50000ba000000000f30b8001800000f23c00f21f83503000a000f23f8670f47ab0098", 0x51}], 0x1, 0x1e, &(0x7f00000005c0)=[@cr0={0x0, 0x2}], 0x1) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x1, 0x1000, &(0x7f0000021000/0x1000)=nil}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000340)=""/141, &(0x7f0000000100)=0x8d) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:40:26 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x70d000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:26 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x68, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1b7) [ 780.781114][ T9205] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:26 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x716000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:26 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1a00, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 780.842097][ T9205] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:26 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x6c, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 780.928677][ T9205] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:26 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x2500, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1ba) 03:40:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x0, 0xffff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:26 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:26 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x760000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:26 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x74, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:26 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1c3) 03:40:26 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x7a, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 781.289149][ T9249] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:26 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x80ffff}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:26 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4800, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:26 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:26 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = socket$inet(0x10, 0x3, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001700)={{{@in=@multicast1, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f0000001800)=0xe8) connect$packet(r5, &(0x7f0000001840)={0x11, 0x15, r6, 0x1, 0x80, 0x6, @dev={[], 0x11}}, 0x14) ioctl(r4, 0x1000008912, &(0x7f0000000140)="c0dca5055e0bcfec7be070") sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)="24000000250007021dfffd946f610500810000031f00000000000800080018000400ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r0, 0xae80, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@empty, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4e20, 0x80, 0x4e24, 0x7ff, 0xa, 0x0, 0x20, 0x3c, 0x0, r7}, {0x80, 0x800, 0x6a, 0x1000, 0x7fff, 0x81, 0x100, 0x5}, {0x3c9, 0x9, 0x400, 0x2cd0}, 0x4, 0x6e6bbb, 0x1, 0x1, 0x3, 0x3}, {{@in6=@remote, 0x4d6}, 0xa, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x22}}, 0x0, 0x5, 0x0, 0x1, 0x4, 0x6, 0xa200}}, 0xe8) 03:40:26 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x300, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1cc) 03:40:26 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4c00, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:26 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x960000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 781.627136][ T9278] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:40:27 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x8020000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:27 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x500, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1cf) 03:40:27 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xd07000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:27 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x60ff, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:27 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x600, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:27 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xe05000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 782.343472][ T9278] bond0: Releasing backup interface bond_slave_1 03:40:27 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) setxattr$trusted_overlay_redirect(0x0, 0x0, &(0x7f0000000100)='./file0\x00', 0x8, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000400)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r4, &(0x7f0000000700), 0x100000000000000d) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000e0000000071107b00000000009500000000006165"], &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x7f\x00'/248}, 0x48) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x121041, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1d4) 03:40:27 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x6800, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:27 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x9000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:27 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x700, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:27 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 782.400093][ T9293] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:40:27 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x2000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:27 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x6c00, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:27 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x900, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1dd) 03:40:27 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:28 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xa00, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:28 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) write$P9_RLERRORu(r3, &(0x7f0000000080)={0x12, 0x7, 0x2, {{0x5, 'wlan0'}, 0xaa}}, 0x12) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:28 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x7400, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:28 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x3000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:28 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xb00, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x1e2) 03:40:28 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xb000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:28 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xc00, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:28 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:28 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x7600, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x20c) 03:40:29 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xc000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:29 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x5000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:29 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x7a00, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:29 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xd00, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000480)='/dev/midi#\x00', 0x5, 0x80) bind$llc(r2, &(0x7f00000004c0)={0x1a, 0x5, 0x6, 0x0, 0xad, 0x1f, @local}, 0x10) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0xffffffffffffffff) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:40:29 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x9600, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x20e) 03:40:29 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xe00, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:29 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:29 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xd000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:29 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xff0f, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:29 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x1100, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:29 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x210) 03:40:29 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x100020, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:29 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) 03:40:29 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xe000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:29 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x1200, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:29 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x8000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x212) 03:40:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x217) 03:40:30 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x2500, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:30 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x9000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:30 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x400000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:30 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:30 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x50e000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:30 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x4000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffd26, 0x0, 0x0, 0x800e00707) readv(r0, &(0x7f00000017c0)=[{&(0x7f0000000680)=""/4096, 0x1000}, {0x0}, {0x0}], 0x3) shutdown(r1, 0x0) 03:40:30 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xa000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x228) 03:40:30 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x607100, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 784.982140][ T9507] __ntfs_error: 26 callbacks suppressed [ 784.982151][ T9507] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:30 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x4800, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:30 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xb000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:30 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x70d000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x22a) [ 785.112000][ T9507] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 785.179917][ T9507] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:30 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x716000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:30 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x11000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:30 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x4c00, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:30 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xc000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 785.459323][ T9547] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 785.487960][ T9547] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 785.504108][ T9547] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x22c) 03:40:31 executing program 4: poll(&(0x7f0000000080)=[{0xffffffffffffffff, 0x4}, {}], 0x2, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xdeb, 0x0, 0x0, 0x800e00925) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) poll(&(0x7f0000000040)=[{r1, 0x11}], 0x1, 0x0) poll(&(0x7f00000000c0)=[{r2}], 0x1, 0xff) shutdown(r0, 0x0) 03:40:31 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xd000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:31 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x760000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:31 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x60ff, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:31 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x12000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:31 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xe000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:31 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x6800, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 785.913771][ T9565] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:31 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x960000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x235) [ 786.004966][ T9565] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:31 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x10000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 786.078395][ T9565] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:31 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x6c00, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:31 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xd07000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:31 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) poll(&(0x7f0000000040), 0x2000000000000014, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0xfffffd26, 0x0, 0x0, 0x800e00707) r1 = fcntl$dupfd(r0, 0x400000000000002, 0xffffffffffffffff) ppoll(&(0x7f0000000080)=[{r0, 0x27}, {r0, 0x2}], 0x2, 0x0, 0x0, 0x0) poll(&(0x7f0000000040)=[{r1}, {r0, 0x80}], 0x2, 0xff) shutdown(r0, 0x0) 03:40:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x23b) 03:40:31 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xe05000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:31 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:31 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x7400, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:31 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x11000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:31 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:31 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x12000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:31 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x7600, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 786.502998][ T9607] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x244) 03:40:31 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:32 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x14000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:32 executing program 4: socket$inet_icmp_raw(0x2, 0x3, 0x1) poll(&(0x7f0000000080), 0x1, 0x4e) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x2d, 0x0, 0x0, 0x800e004ae) poll(&(0x7f0000000000)=[{r0}, {}], 0x2, 0x735) shutdown(r0, 0x0) 03:40:32 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x7a00, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:32 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x2000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:32 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x20000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x24d) 03:40:32 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:32 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x3000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:32 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x9600, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:32 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x20001000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x250) 03:40:32 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:32 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x25000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:33 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TIOCGISO7816(r0, 0x80285442, 0x0) 03:40:33 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x25000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:33 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xff0f, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x259) 03:40:33 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x5000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:33 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x260f0000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:33 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x40000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:33 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x100020, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:33 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x6000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x262) 03:40:33 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:33 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x7000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:33 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:33 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x400000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x265) 03:40:33 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x43000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:33 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x8000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:33 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:33 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x9000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:33 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x50e000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x26a) 03:40:33 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x48000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:34 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x607100, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:34 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:34 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:34 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xa000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x273) 03:40:34 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4c000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:34 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xb000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:34 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x70d000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x278) 03:40:34 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x68000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:34 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:34 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:34 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xc000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:34 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x716000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2a2) 03:40:34 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:34 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xd000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:34 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6c000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:34 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x760000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2a4) 03:40:34 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xe000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:34 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x960000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:34 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x56010000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:34 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x74000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:34 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x10000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:34 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:34 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xd07000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2a6) 03:40:34 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x11000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:35 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7a000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:35 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xe05000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:35 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x57010000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:35 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2a8) 03:40:35 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xff0f0000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:35 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x12000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:35 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x1000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:35 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2ad) 03:40:35 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x5c000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:35 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1a000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:35 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xff600000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:35 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x2000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:35 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x3000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2be) 03:40:35 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x20001000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:35 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xffff0000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:35 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) [ 790.292234][ T9899] __ntfs_error: 32 callbacks suppressed [ 790.292244][ T9899] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 790.369255][ T9899] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:35 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xffff8000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:35 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x4000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 790.421860][ T9899] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:35 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:36 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x25000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:36 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x10000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2c0) 03:40:36 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x60000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:36 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:36 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x5000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:36 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x40000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:36 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x6000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2c2) [ 790.804499][ T9949] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:36 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x400000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 790.854293][ T9949] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:36 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:36 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x48000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:36 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x7000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 790.974956][ T9949] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:36 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x555557125000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:36 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4c000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:36 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2cb) 03:40:36 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:36 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x8000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:36 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x555557147000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:36 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x68000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 791.299504][ T9985] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:36 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x9000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 791.389275][ T9985] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:36 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2d1) 03:40:36 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x60ffffffffff}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 791.433022][ T9985] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:36 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x6c000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:36 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xa000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:36 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:36 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2da) 03:40:37 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x760000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:37 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x74000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:37 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xb000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:37 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x7a000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 791.820380][T10023] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2e3) 03:40:37 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:37 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7ffffffff000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:37 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xc000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:37 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xff0f0000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:37 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:37 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:37 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x960000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:37 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xd000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2e6) 03:40:37 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xff600000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:37 executing program 4: connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet6(r0, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:37 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:37 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:37 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xe000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:37 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x10000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2ef) 03:40:37 executing program 4: connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet6(r0, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:37 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x10000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:37 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x10002000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:37 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x315655550000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:37 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:38 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x11000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:38 executing program 4: connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendto$inet6(r0, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:38 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x400000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2f8) 03:40:38 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x40000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:38 executing program 4: r0 = socket(0x0, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:38 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x5555562ee000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:38 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:38 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x12000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x2fb) 03:40:38 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x50125755550000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:38 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x555556310000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:38 executing program 4: r0 = socket(0x0, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:38 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x20001000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x300) 03:40:38 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x60ffffffffff, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:38 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x60710000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:38 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x25000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:38 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x760000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:38 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xa8020000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:38 executing program 4: r0 = socket(0x0, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x309) 03:40:38 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x70145755550000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:38 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x40000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:38 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x7ffffffff000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x30e) 03:40:39 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xa9020000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:39 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x48000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:39 executing program 4: r0 = socket(0x2, 0x0, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:39 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x80ffff00000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:39 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x960000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x338) 03:40:39 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x10002000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:39 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x4c000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:39 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:39 executing program 4: r0 = socket(0x2, 0x0, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:39 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xd0700000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:39 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x60710000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:39 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x68000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x33a) 03:40:39 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xe0500000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:39 executing program 4: r0 = socket(0x2, 0x0, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:39 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xebffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:39 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xd0700000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:39 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x6c000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x33c) 03:40:39 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xf0ffffff7f0000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:39 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xe02e5655550000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:39 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x74000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x33e) 03:40:40 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:40 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x100000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:40 executing program 4: r0 = socket(0x2, 0x3, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:40 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x7a000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:40 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xe0500000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x343) 03:40:40 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x200000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:40 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xf7010000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:40 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xff0f0000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:40 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xf0ffffff7f0000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:40 executing program 4: r0 = socket(0x2, 0x3, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x354) 03:40:40 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x100000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:40 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x300000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:40 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xff600000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:40 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:40 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x200000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:40 executing program 4: r0 = socket(0x2, 0x3, 0x0) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:40 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x400000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x356) 03:40:40 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x400000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:40 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x300000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 795.471039][T10371] __ntfs_error: 32 callbacks suppressed [ 795.471049][T10371] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:40 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x500000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 795.545973][T10371] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:40 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x400000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x358) 03:40:41 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:41 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x5555558fa000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 795.662925][T10371] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:41 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:41 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x600000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:41 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x500000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x361) 03:40:41 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x55555591c000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:41 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:41 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x600000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:41 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x700000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 795.959380][T10407] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:41 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x60ffffffffff, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x367) [ 796.038001][T10407] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:41 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:41 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x700000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 796.099245][T10407] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:41 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:41 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x760000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:41 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x800000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:41 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x800000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x370) 03:40:41 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, 0x0, 0x0) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:41 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x900000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:41 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x7ffffffff000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:41 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x900000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 796.491900][T10448] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:41 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, 0x0, 0x0) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x379) 03:40:41 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xa00000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 796.553206][T10448] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 796.615611][T10448] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:42 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x960000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:42 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xb00000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:42 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xa00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:42 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, 0x0, 0x0) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:42 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x37c) 03:40:42 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xc00000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:42 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:42 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xb00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:42 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x10002000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x385) [ 796.954051][T10489] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:42 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xd00000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:42 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x60710000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:42 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:42 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xc00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x38e) 03:40:42 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:42 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xe00000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:42 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(0xffffffffffffffff, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:42 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xd00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:42 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xa08f5555550000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:42 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1000000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x391) 03:40:42 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:42 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1100000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:42 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xe00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:42 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xc0915555550000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:42 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, 0x0, 0x0, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x396) 03:40:43 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1200000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:43 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1000000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:43 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:43 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xd0700000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:43 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, 0x0, 0x0, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:43 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x1a00000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x39f) 03:40:43 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1100000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:43 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xe0500000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:43 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x2500000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:43 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, 0x0, 0x0, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:43 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffff97, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x3a4) 03:40:43 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xf0ffffff7f0000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:43 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4000000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:43 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1200000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:43 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600), 0x0, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:43 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x100000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:43 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1400000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x3ce) 03:40:43 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4800000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:43 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffeb, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:43 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x200000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:43 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600), 0x0, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:43 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x4c00000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x3d0) 03:40:43 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x2000000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:44 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:44 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x300000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:44 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x6800000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x3d2) 03:40:44 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600), 0x0, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:44 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x2500000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:44 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x6c00000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:44 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x400000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:44 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:44 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4000000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:44 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="04", 0x1, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x3d4) 03:40:44 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x7400000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:44 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4300000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:44 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="04", 0x1, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x3d9) 03:40:44 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x500000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:44 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:44 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4800000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:44 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x7a00000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:44 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x600000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:44 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="04", 0x1, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x3ea) 03:40:44 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4c00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:44 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xff0f000000000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:44 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x80000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:45 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x700000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:45 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x3ec) 03:40:45 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xffffffff00000000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:45 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6800000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:45 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:45 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x800000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x3ee) 03:40:45 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:45 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0xffffffffff600000, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:45 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6c00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:45 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x900000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:45 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:45 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x3f7) 03:40:45 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7400000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:45 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:45 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xa00000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:45 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:45 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:45 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7a00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:45 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x900, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x3fd) 03:40:45 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xb00000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:45 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:45 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:46 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xa00, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:46 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xc00000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:46 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xff0f000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:46 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) [ 800.767105][T10830] __ntfs_error: 38 callbacks suppressed [ 800.767117][T10830] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:46 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xd00000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x406) [ 800.850820][T10830] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:46 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xffff000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:46 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xb00, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 800.959210][T10830] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:46 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:46 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xe00000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:46 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x14c000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:46 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xc00, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:46 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xffffffff00000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x40f) 03:40:46 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:46 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x1000000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:46 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xffffffffff600000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:46 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xd00, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x412) 03:40:46 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) [ 801.391506][T10878] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:46 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x1100000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 801.493719][T10878] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:46 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x2}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 801.580240][T10878] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:47 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:47 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xe00, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x41b) 03:40:47 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:47 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x1200000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:47 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x3}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:47 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x2500000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:47 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:47 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x1300, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x424) 03:40:47 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) [ 801.977362][T10922] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:47 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x5}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 802.028354][T10922] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 802.173762][T10922] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:47 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:47 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x4000000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:47 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x2, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:47 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x427) 03:40:47 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x6}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:47 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x4800000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:47 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x3, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:47 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x7}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:47 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, 0x0, 0x0, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x42c) 03:40:47 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x8}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 802.516719][T10960] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:48 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:48 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x4c00000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:48 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x4, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:48 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, 0x0, 0x0, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x435) 03:40:48 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x9}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:48 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x6800000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:48 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x5, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x43a) 03:40:48 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, 0x0, 0x0, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:48 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x6c00000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:48 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xa}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:48 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:48 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x6, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:48 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080), 0x0, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x464) 03:40:48 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x7400000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:48 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xb}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:48 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080), 0x0, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:48 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x7, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:48 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xc}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:48 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x8, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:48 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x7a00000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x466) 03:40:48 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:48 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080), 0x0, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x468) 03:40:48 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x9, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:48 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xff0f000000000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:48 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xd}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:48 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6", 0x8, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:48 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xa, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:49 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:49 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xffffffff00000000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x46a) 03:40:49 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xe}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:49 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6", 0x8, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:49 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xb, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:49 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0xffffffffff600000, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:49 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xc, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:49 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x10}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:49 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x2, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x46f) 03:40:49 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:49 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6", 0x8, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:49 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xd, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:49 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x3, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:49 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x11}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:49 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x802000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x480) 03:40:49 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xe, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:49 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d", 0xc, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:49 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x12}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:49 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x4, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:49 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x10, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x482) 03:40:50 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d", 0xc, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:50 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x5, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:50 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x11, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:50 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x900000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:50 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x14}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:50 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x12, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x484) 03:40:50 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d", 0xc, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:50 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x6, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:50 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:50 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x25}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x48d) 03:40:50 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x7, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:50 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1a, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:50 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xb00000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:50 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x25, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:50 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x8, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x493) 03:40:50 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x43}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:50 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403", 0xe, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:50 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x48, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:50 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x48}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x49c) 03:40:50 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xc00000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:50 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x9, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:51 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403", 0xe, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:51 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x4c, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:51 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xa, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:51 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4c}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x4a5) 03:40:51 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xd00000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:51 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x68}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:51 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x68, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:51 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403", 0xe, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:51 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xb, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x4a8) [ 805.918033][T11269] __ntfs_error: 32 callbacks suppressed [ 805.918045][T11269] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 805.951246][T11269] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 805.974178][T11269] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:51 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x6c}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:51 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xe00000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:51 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x6c, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:51 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae", 0xf, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x4b1) 03:40:51 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:51 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x74, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 806.316034][T11300] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:51 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x74}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 806.359080][T11300] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:51 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x7a, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:51 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae", 0xf, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:51 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xd, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 806.411749][T11300] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x4ba) 03:40:51 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x300, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:51 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:51 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x7a}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:51 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xe, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:51 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae", 0xf, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x4bd) 03:40:52 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x500, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:52 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x10, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:52 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x300}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 806.814228][T11337] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x4c2) 03:40:52 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x600, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 806.979484][T11337] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:52 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x11, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:52 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x500}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 807.116777][T11337] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:52 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x1100000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:52 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x700, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:52 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x4cb) 03:40:52 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x600}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:52 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x12, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:52 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x900, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:52 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x25, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:52 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:52 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x700}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x4d0) [ 807.375923][T11384] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:52 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xa00, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:52 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x1200000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:52 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x48, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x4fa) 03:40:53 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:53 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x900}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:53 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xb00, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:53 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:53 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x4fc) 03:40:53 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:53 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xa00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:53 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xc00, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:53 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xd00, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:53 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xb00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:53 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xe00, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:53 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x68, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x4fe) 03:40:53 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:53 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:53 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:53 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1100, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:53 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffff71, 0x2, 0x400000000000000}, 0x28) 03:40:53 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xc00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x500) 03:40:53 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x74, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:53 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1200, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:53 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xd00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:53 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, 0x0, 0x0) 03:40:53 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x505) 03:40:54 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x7a, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:54 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1a00, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:54 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, 0x0, 0x0) 03:40:54 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xe00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:54 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x300, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x516) 03:40:54 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x2500000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:54 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x2500, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:54 executing program 4: r0 = socket(0x2, 0x3, 0x100000001) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendto(r0, &(0x7f0000000600)="0400", 0x2, 0x8002, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendto$inet6(r1, &(0x7f0000000080)="5f76be6259863ad6e17c6d8d7403ae04", 0x10, 0x8000, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, 0x0, 0x0) 03:40:54 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x500, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:54 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x1100}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x518) 03:40:54 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x4000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:54 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x600, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:54 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000017000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f0000000040)="ba4300b00bee660f3a172e0010000f32652e0f0866b83c4a00000f23c80f21f866350c0030000f23f83e0b450eb804010f00d00f01f60f3800210f01cf", 0x3d}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000dec000)='smaps\x00') madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) setxattr$trusted_overlay_redirect(0x0, 0x0, &(0x7f0000000100)='./file0\x00', 0x8, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, &(0x7f0000000400)) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_int(r3, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r4, &(0x7f0000000700), 0x100000000000000d) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000e0000000071107b00000000009500000000006165"], &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x7f\x00'/248}, 0x48) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x121041, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:40:54 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x260f000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:54 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x1200}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:54 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x700, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:54 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x4800, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x51a) 03:40:54 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x900, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:54 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x4c00, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:55 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x1400}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:55 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:55 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x60ff, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:55 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xa00, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:55 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x523) 03:40:55 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x6800, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:55 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x2000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:55 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xb00, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:55 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:55 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x6c00, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:55 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc00, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:55 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x2500}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x529) 03:40:55 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:55 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x7400, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:55 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xd00, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:55 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:55 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:55 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x532) 03:40:55 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xe00, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:55 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x7600, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:55 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4300}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:56 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x1100, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x53b) 03:40:56 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:56 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x7a00, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:56 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4800}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x53e) 03:40:56 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x1200, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:56 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x9600, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:56 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x5601000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:56 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4c00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:56 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x2500, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x547) 03:40:56 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xff0f, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:56 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:56 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x4000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 811.247607][T11707] __ntfs_error: 32 callbacks suppressed [ 811.247638][T11707] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:56 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x60ff}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:56 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x100020, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x550) [ 811.362444][T11707] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:56 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x4800, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 811.504685][T11707] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:57 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x5701000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:57 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:57 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x400000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x553) 03:40:57 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x6800}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:57 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x4c00, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:57 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x60ff, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:57 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x6c00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x558) 03:40:57 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x50e000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 811.833940][T11753] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:57 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 811.878953][T11753] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:57 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x6800, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 811.989122][T11753] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:57 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x5c00000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:57 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x7400}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:57 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 03:40:57 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x607100, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x561) 03:40:57 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x7600}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:57 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x70d000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:57 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x6c00, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 812.213044][T11786] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:57 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 03:40:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x566) [ 812.263536][T11786] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:40:57 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x7a00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:57 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 812.420197][T11786] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:40:57 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:57 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x7400, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:57 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x716000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x590) 03:40:57 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x9600}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:58 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000001480)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 03:40:58 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x760000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:58 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x7600, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x592) [ 812.752811][T11830] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:40:58 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000001480)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 03:40:58 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xff0f}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:58 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x960000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:58 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:58 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x7a00, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x594) 03:40:58 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000001480)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 03:40:58 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xd07000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:58 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x100020}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:58 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x9600, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:58 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:58 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:58 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xe05000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x596) 03:40:58 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:58 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x400000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:58 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:58 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xff0f, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x59b) 03:40:58 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:58 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:58 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x50e000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:58 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x2000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:58 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x100020, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x5ac) 03:40:59 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:59 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x3000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:59 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:59 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x607100}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:59 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x400000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x5ae) 03:40:59 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x4000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:59 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:59 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x70d000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:59 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x50e000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:59 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:59 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:59 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x5000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:59 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x716000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:59 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x607100, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x5b0) 03:40:59 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 03:40:59 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x6000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:59 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x97ffffff00000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:40:59 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x7000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:40:59 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 03:40:59 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x70d000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:40:59 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x760000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:40:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x5b9) 03:41:00 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 03:41:00 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x8000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:00 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x716000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:00 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xa802000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x5bf) 03:41:00 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x80ffff}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:00 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x9000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:00 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000}, 0x20) 03:41:00 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x760000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:00 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x960000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:00 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xa902000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:00 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xa000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x5c8) 03:41:00 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000}, 0x20) 03:41:00 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xd07000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:00 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000}, 0x20) 03:41:00 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x960000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:00 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xebffffff00000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:00 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xb000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x5d1) 03:41:00 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xe05000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:00 executing program 4: 03:41:00 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xc000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:00 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:01 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xd07000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x5d4) 03:41:01 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x1000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:01 executing program 4: 03:41:01 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xd000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x5dd) 03:41:01 executing program 4: 03:41:01 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xe05000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:01 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x2000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:01 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xf701000000000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:01 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xe000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:01 executing program 4: 03:41:01 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x1000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x5e6) 03:41:01 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x3000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:01 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x10000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 816.250352][T12136] __ntfs_error: 32 callbacks suppressed [ 816.250363][T12136] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:41:01 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:01 executing program 4: [ 816.293762][T12136] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 816.309763][T12136] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:41:01 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x2000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x5e9) 03:41:01 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x11000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:01 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:01 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x5000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:01 executing program 4: 03:41:01 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x3000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x5ee) 03:41:02 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x12000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:02 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x6000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:02 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1a000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:02 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x4000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 816.806865][T12175] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:41:02 executing program 4: 03:41:02 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x7000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 816.887627][T12175] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 03:41:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x5f7) [ 816.970837][T12175] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:41:02 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:02 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x20001000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:02 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x5000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:02 executing program 4: 03:41:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x5fc) 03:41:02 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x8000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:02 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x6000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:02 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x25000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x626) 03:41:02 executing program 4: 03:41:02 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x9000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:02 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x7000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 817.388910][T12218] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 817.398202][T12218] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 817.398210][T12218] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 03:41:02 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:02 executing program 4: 03:41:02 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x40000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x628) 03:41:02 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xa000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:02 executing program 4: 03:41:03 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x48000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x62a) 03:41:03 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xb000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:03 executing program 4: 03:41:03 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x8000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 817.797077][T12252] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 03:41:03 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x9000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:03 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:03 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x4c000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:03 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x2000000, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:03 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xc000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x62c) 03:41:03 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xa000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:03 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x68000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:03 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0xff0f, 0x1, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:03 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xd000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x631) 03:41:03 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xb000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:03 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x6c000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:03 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:03 executing program 4 (fault-call:1 fault-nth:0): mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:03 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x74000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x642) [ 818.394943][T12312] FAULT_INJECTION: forcing a failure. [ 818.394943][T12312] name failslab, interval 1, probability 0, space 0, times 0 [ 818.426531][T12312] CPU: 1 PID: 12312 Comm: syz-executor.4 Not tainted 5.2.0-rc5+ #4 [ 818.434493][T12312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 818.444616][T12312] Call Trace: [ 818.447939][T12312] dump_stack+0x1d8/0x2f8 [ 818.452304][T12312] should_fail+0x608/0x860 [ 818.456753][T12312] ? setup_fault_attr+0x2b0/0x2b0 [ 818.461806][T12312] __should_failslab+0x11a/0x160 [ 818.466767][T12312] should_failslab+0x9/0x20 [ 818.471299][T12312] kmem_cache_alloc_trace+0x5d/0x2c0 [ 818.476611][T12312] ? btf_new_fd+0x176/0x37b0 [ 818.481228][T12312] btf_new_fd+0x176/0x37b0 [ 818.485669][T12312] ? check_preemption_disabled+0x47/0x280 03:41:03 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:03 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x7a000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:03 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xe000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:03 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xd000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 818.491413][T12312] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 818.498033][T12312] ? __might_fault+0xf9/0x160 [ 818.502726][T12312] ? cap_capable+0x250/0x290 [ 818.507338][T12312] ? btf_release+0xd0/0xd0 [ 818.511776][T12312] ? security_capable+0xa2/0xd0 [ 818.516649][T12312] __do_sys_bpf+0x1212/0xc5d0 [ 818.521368][T12312] ? kasan_check_write+0x14/0x20 [ 818.526327][T12312] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 818.532494][T12312] ? __bpf_prog_put_rcu+0x320/0x320 [ 818.537713][T12312] ? refcount_inc_checked+0x50/0x50 [ 818.542940][T12312] ? refcount_dec_and_test_checked+0x1a/0x20 [ 818.548938][T12312] ? proc_fail_nth_write+0x179/0x1f0 [ 818.554248][T12312] ? proc_fail_nth_read+0x1a0/0x1a0 [ 818.559462][T12312] ? trace_lock_acquire+0x190/0x190 [ 818.559477][T12312] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 818.559488][T12312] ? __mutex_lock_common+0x56b/0x2fc0 [ 818.559503][T12312] ? memset+0x31/0x40 [ 818.559516][T12312] ? fsnotify+0x14b9/0x1580 [ 818.559537][T12312] ? __f_unlock_pos+0x19/0x20 [ 818.559552][T12312] ? kasan_check_write+0x14/0x20 03:41:03 executing program 4 (fault-call:1 fault-nth:1): mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 818.559561][T12312] ? __mutex_unlock_slowpath+0x18c/0x630 [ 818.559580][T12312] ? mutex_unlock+0x10/0x10 [ 818.571412][T12312] ? __sb_end_write+0xde/0x120 [ 818.571429][T12312] ? kasan_check_write+0x14/0x20 [ 818.571439][T12312] ? fput_many+0x47/0x1a0 [ 818.571464][T12312] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 818.571476][T12312] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 818.571485][T12312] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 818.571495][T12312] ? trace_irq_disable_rcuidle+0x23/0x1c0 03:41:03 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x10000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 818.571506][T12312] ? do_syscall_64+0x1d/0x140 [ 818.571520][T12312] __x64_sys_bpf+0x7a/0x90 [ 818.571533][T12312] do_syscall_64+0xfe/0x140 [ 818.571549][T12312] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 818.571559][T12312] RIP: 0033:0x4592c9 [ 818.571571][T12312] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 818.571577][T12312] RSP: 002b:00007f07981a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 03:41:04 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xe000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:04 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xff0f0000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 818.571586][T12312] RAX: ffffffffffffffda RBX: 00007f07981a0c90 RCX: 00000000004592c9 [ 818.571593][T12312] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 818.571599][T12312] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 818.571604][T12312] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07981a16d4 [ 818.571610][T12312] R13: 00000000004bf4d3 R14: 00000000004d0aa0 R15: 0000000000000003 03:41:04 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x644) 03:41:04 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x10000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:04 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x11000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:04 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xff600000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x646) [ 819.014554][T12353] FAULT_INJECTION: forcing a failure. [ 819.014554][T12353] name failslab, interval 1, probability 0, space 0, times 0 [ 819.049008][T12353] CPU: 0 PID: 12353 Comm: syz-executor.4 Not tainted 5.2.0-rc5+ #4 [ 819.058477][T12353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.068561][T12353] Call Trace: [ 819.071876][T12353] dump_stack+0x1d8/0x2f8 [ 819.076234][T12353] should_fail+0x608/0x860 [ 819.080686][T12353] ? setup_fault_attr+0x2b0/0x2b0 [ 819.085757][T12353] __should_failslab+0x11a/0x160 [ 819.090707][T12353] should_failslab+0x9/0x20 [ 819.095235][T12353] kmem_cache_alloc_trace+0x5d/0x2c0 [ 819.100532][T12353] ? btf_new_fd+0x326/0x37b0 [ 819.105151][T12353] btf_new_fd+0x326/0x37b0 [ 819.109572][T12353] ? check_preemption_disabled+0x47/0x280 [ 819.115306][T12353] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 819.121925][T12353] ? __might_fault+0xf9/0x160 [ 819.126614][T12353] ? cap_capable+0x250/0x290 [ 819.131203][T12353] ? btf_release+0xd0/0xd0 [ 819.135636][T12353] ? security_capable+0xa2/0xd0 [ 819.140493][T12353] __do_sys_bpf+0x1212/0xc5d0 [ 819.145207][T12353] ? kasan_check_write+0x14/0x20 [ 819.150166][T12353] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 819.156340][T12353] ? __bpf_prog_put_rcu+0x320/0x320 [ 819.163423][T12353] ? refcount_inc_checked+0x50/0x50 [ 819.168650][T12353] ? refcount_dec_and_test_checked+0x1a/0x20 [ 819.174632][T12353] ? proc_fail_nth_write+0x179/0x1f0 [ 819.179922][T12353] ? proc_fail_nth_read+0x1a0/0x1a0 [ 819.185143][T12353] ? trace_lock_acquire+0x190/0x190 [ 819.190341][T12353] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 819.196924][T12353] ? __mutex_lock_common+0x56b/0x2fc0 [ 819.202307][T12353] ? memset+0x31/0x40 [ 819.206286][T12353] ? fsnotify+0x14b9/0x1580 [ 819.210794][T12353] ? __f_unlock_pos+0x19/0x20 [ 819.215469][T12353] ? kasan_check_write+0x14/0x20 [ 819.220402][T12353] ? __mutex_unlock_slowpath+0x18c/0x630 [ 819.226028][T12353] ? mutex_unlock+0x10/0x10 [ 819.230533][T12353] ? __sb_end_write+0xde/0x120 [ 819.235298][T12353] ? kasan_check_write+0x14/0x20 [ 819.240240][T12353] ? fput_many+0x47/0x1a0 [ 819.244580][T12353] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 819.250302][T12353] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 819.255939][T12353] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 819.261420][T12353] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 819.267152][T12353] ? do_syscall_64+0x1d/0x140 [ 819.271836][T12353] __x64_sys_bpf+0x7a/0x90 [ 819.276262][T12353] do_syscall_64+0xfe/0x140 [ 819.280770][T12353] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 819.286667][T12353] RIP: 0033:0x4592c9 [ 819.290561][T12353] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 03:41:04 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x10000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:04 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x12000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 819.310179][T12353] RSP: 002b:00007f07981a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 819.318601][T12353] RAX: ffffffffffffffda RBX: 00007f07981a0c90 RCX: 00000000004592c9 [ 819.326579][T12353] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 819.334559][T12353] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 819.342547][T12353] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07981a16d4 [ 819.350553][T12353] R13: 00000000004bf4d3 R14: 00000000004d0aa0 R15: 0000000000000003 03:41:04 executing program 4 (fault-call:1 fault-nth:2): mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:04 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x2, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:04 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x11000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:04 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x315655550000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x64f) 03:41:04 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x14000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:04 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x12000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:04 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x655) 03:41:05 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x400000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:05 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x20000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:05 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x3, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) [ 819.724258][T12391] FAULT_INJECTION: forcing a failure. [ 819.724258][T12391] name failslab, interval 1, probability 0, space 0, times 0 [ 819.789426][T12391] CPU: 0 PID: 12391 Comm: syz-executor.4 Not tainted 5.2.0-rc5+ #4 [ 819.797397][T12391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 819.807479][T12391] Call Trace: [ 819.810805][T12391] dump_stack+0x1d8/0x2f8 [ 819.815177][T12391] should_fail+0x608/0x860 [ 819.819631][T12391] ? setup_fault_attr+0x2b0/0x2b0 [ 819.824692][T12391] __should_failslab+0x11a/0x160 [ 819.829657][T12391] should_failslab+0x9/0x20 [ 819.834183][T12391] kmem_cache_alloc_node_trace+0x6e/0x280 [ 819.839932][T12391] ? __kmalloc_node+0x3c/0x60 [ 819.844682][T12391] __kmalloc_node+0x3c/0x60 [ 819.849220][T12391] kvmalloc_node+0xcc/0x130 [ 819.853747][T12391] btf_new_fd+0x374/0x37b0 [ 819.858181][T12391] ? check_preemption_disabled+0x47/0x280 [ 819.863924][T12391] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 819.870543][T12391] ? __might_fault+0xf9/0x160 [ 819.875253][T12391] ? cap_capable+0x250/0x290 [ 819.879955][T12391] ? btf_release+0xd0/0xd0 [ 819.884399][T12391] ? security_capable+0xa2/0xd0 [ 819.889274][T12391] __do_sys_bpf+0x1212/0xc5d0 [ 819.893991][T12391] ? kasan_check_write+0x14/0x20 [ 819.898961][T12391] ? refcount_sub_and_test_checked+0x1c2/0x290 [ 819.905140][T12391] ? __bpf_prog_put_rcu+0x320/0x320 [ 819.910357][T12391] ? refcount_inc_checked+0x50/0x50 [ 819.915605][T12391] ? refcount_dec_and_test_checked+0x1a/0x20 [ 819.921610][T12391] ? proc_fail_nth_write+0x179/0x1f0 [ 819.926931][T12391] ? proc_fail_nth_read+0x1a0/0x1a0 [ 819.932169][T12391] ? trace_lock_acquire+0x190/0x190 [ 819.937401][T12391] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 819.944020][T12391] ? __mutex_lock_common+0x56b/0x2fc0 [ 819.949418][T12391] ? memset+0x31/0x40 [ 819.953684][T12391] ? fsnotify+0x14b9/0x1580 [ 819.958314][T12391] ? __f_unlock_pos+0x19/0x20 [ 819.963029][T12391] ? kasan_check_write+0x14/0x20 [ 819.967988][T12391] ? __mutex_unlock_slowpath+0x18c/0x630 [ 819.973643][T12391] ? mutex_unlock+0x10/0x10 [ 819.973662][T12391] ? __sb_end_write+0xde/0x120 [ 819.982946][T12391] ? kasan_check_write+0x14/0x20 03:41:05 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x4, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) [ 819.982958][T12391] ? fput_many+0x47/0x1a0 [ 819.982980][T12391] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 819.982990][T12391] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 819.983000][T12391] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 819.983010][T12391] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 819.983020][T12391] ? do_syscall_64+0x1d/0x140 [ 819.983034][T12391] __x64_sys_bpf+0x7a/0x90 [ 819.983049][T12391] do_syscall_64+0xfe/0x140 [ 820.028671][T12391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 820.034571][T12391] RIP: 0033:0x4592c9 [ 820.038457][T12391] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 820.058233][T12391] RSP: 002b:00007f07981a0c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 820.066643][T12391] RAX: ffffffffffffffda RBX: 00007f07981a0c90 RCX: 00000000004592c9 [ 820.074733][T12391] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 820.082705][T12391] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 03:41:05 executing program 4 (fault-call:1 fault-nth:3): mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:05 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x20001000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:05 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x5, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x65e) 03:41:05 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x20001000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:05 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x5555562ee000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 820.090929][T12391] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07981a16d4 [ 820.099018][T12391] R13: 00000000004bf4d3 R14: 00000000004d0aa0 R15: 0000000000000003 03:41:05 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x555556310000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:05 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x25000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:05 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x6, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:05 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x25000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:05 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x667) 03:41:05 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x60ffffffffff, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:05 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x40000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:05 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x40000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:05 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x7, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:05 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x66a) 03:41:05 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x760000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:05 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x48000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:06 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x43000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:06 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x8, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:06 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x7ffffffff000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:06 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x9, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:06 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x673) 03:41:06 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x4c000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:06 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x48000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:06 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x960000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:06 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:06 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x68000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:06 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xa, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x67c) 03:41:06 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x10002000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:06 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4c000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:06 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xb, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:06 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:06 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x6c000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:06 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x60710000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x67f) 03:41:06 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x68000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:06 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:06 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xc, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:06 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xd0700000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x684) 03:41:06 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x74000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:06 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:06 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xe02e5655550000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:06 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x6c000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:06 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x7a000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:07 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xd, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x68d) 03:41:07 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:07 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xe0500000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:07 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xff0f0000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:07 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x74000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:07 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xf0ffffff7f0000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:07 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xe, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x692) 03:41:07 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:07 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x100000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:07 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xff600000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:07 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x7a000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:07 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x200000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:07 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x10, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x6bc) 03:41:07 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:07 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x300000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:07 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x400000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:07 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x11, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:07 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xff0f0000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:07 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:07 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x5555558fa000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x6be) 03:41:07 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x400000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:07 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:07 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xff600000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:07 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x12, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:07 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x6c0) 03:41:07 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x55555591c000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:07 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x500000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:07 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xffff0000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:08 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x25, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:08 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x6c2) 03:41:08 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xffff8000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:08 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x600000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:08 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x60ffffffffff, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:08 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x48, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:08 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x6c7) 03:41:08 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x700000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:08 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x760000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:08 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:08 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x10000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:08 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:08 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x7ffffffff000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:08 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x400000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:08 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x800000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:08 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:08 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x555557125000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:08 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x900000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x6d8) 03:41:08 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x5c, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:08 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x960000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:08 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:08 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x555557147000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:08 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xa00000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x6da) 03:41:09 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x10002000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:09 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x60, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:09 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xb00000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:09 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:09 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x60ffffffffff}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:09 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xc00000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x6dc) 03:41:09 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x60710000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:09 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:09 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x68, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:09 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x760000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:09 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xa08f5555550000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:09 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xd00000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x6e5) 03:41:09 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:09 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x7ffffffff000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:09 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:09 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xe00000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:09 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc0915555550000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x6eb) 03:41:09 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1000000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:09 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xd0700000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:09 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:09 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x74, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:09 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x960000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:09 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1100000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x6f4) 03:41:09 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xe0500000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:09 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:09 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1200000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:09 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x1000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:10 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:10 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x14c, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:10 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xf0ffffff7f0000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x6fd) 03:41:10 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1a00000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:10 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x4, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:10 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x100000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:10 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x10002000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x700) 03:41:10 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x2500000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:10 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x156, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:10 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x40000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:10 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:10 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x200000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:10 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x4000000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x709) 03:41:10 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x157, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:10 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x300000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:10 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x4800000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:10 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x50125755550000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x712) 03:41:10 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x3ee, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:10 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1f7, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:10 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x60710000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:10 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x4c00000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:10 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x400000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:10 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x3f3, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:10 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x208, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:10 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x500000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x715) 03:41:11 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x70145755550000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:11 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x6800000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:11 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x3f4, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:11 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x600000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:11 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x2a8, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x71a) 03:41:11 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x6c00000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:11 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x80ffff00000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:11 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x700000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:11 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x3f5, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:11 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x2a9, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x723) 03:41:11 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x7400000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:11 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x800000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:11 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xd0700000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:11 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x3f6, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:11 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x300, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:11 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x7a00000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x728) 03:41:11 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x900000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:11 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x500, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:11 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0xffffff1f, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:11 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xe0500000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:11 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xff0f000000000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:11 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xa00000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:11 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x600, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x752) 03:41:11 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:11 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xffffffff00000000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:11 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xf0ffffff7f0000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:12 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x700, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:12 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xb00000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:12 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0xffffffffff600000, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x754) 03:41:12 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x802, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:12 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:12 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x100000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:12 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc00000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:12 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x2, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x756) 03:41:12 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x900, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:12 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:12 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x3, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:12 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x200000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:12 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xd00000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:12 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x758) 03:41:12 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:12 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:12 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xe00000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:12 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xb00, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:12 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x300000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:12 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x75d) 03:41:12 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x1000000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:12 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:12 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xc00, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:12 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x5, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:12 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x1100000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:12 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x400000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:12 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:12 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x6, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:13 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xd00, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:13 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x1200000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x76e) 03:41:13 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:13 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x500000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:13 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x7, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:13 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:13 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x2500000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x770) 03:41:13 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:13 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x600000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:13 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:13 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x4000000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:13 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xf26, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x772) 03:41:13 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x9, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:13 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:13 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x4800000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:13 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x700000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:13 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:13 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xa, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:13 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x77b) 03:41:13 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x4c00000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:13 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1100, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:13 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x800000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:13 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xb, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:13 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x781) 03:41:13 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x6800000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:13 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xc, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:14 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x900000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:14 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1200, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:14 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:14 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x6c00000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x78a) 03:41:14 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xd, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:14 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xa00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:14 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:14 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:14 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x7400000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:14 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xe, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:14 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xb00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x793) 03:41:14 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:14 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:14 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x7a00000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:14 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x10, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:14 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xc00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:14 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:14 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xff0f000000000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x796) 03:41:14 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:14 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x11, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:14 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:14 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xffffffff00000000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:14 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x2500, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x79f) 03:41:14 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xd00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:14 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x12, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:14 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x1a, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:15 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xffffffffff600000, 0x0, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:15 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x260f, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x7a8) 03:41:15 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1a, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:15 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xe00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:15 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:15 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x2, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:15 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x7ab) 03:41:15 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x25, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:15 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:15 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x1000000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:15 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:15 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x3, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x7b0) 03:41:15 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x48, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:15 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x1100000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x7b9) 03:41:15 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:15 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:15 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:15 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4c, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:15 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x1200000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:15 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x7be) 03:41:15 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:15 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x5, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:15 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x68, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:15 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x1400000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:16 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x4c01, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x7e8) 03:41:16 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:16 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x6c, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:16 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x6, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:16 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x2000000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:16 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x5601, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:16 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:16 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x2500000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:16 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:16 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x74, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x7ea) 03:41:16 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x5701, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:16 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x8, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:16 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4000000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:16 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:16 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x7a, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x7ec) 03:41:16 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x5c00, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:16 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x9, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:16 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x300, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:16 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x300, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:16 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4300000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x7ee) 03:41:16 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xa, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:16 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x500, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:16 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x500, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:16 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:16 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xb, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:16 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4800000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x7f3) 03:41:17 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x600, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:17 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x600, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:17 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:17 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xc, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:17 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4c00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:17 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x700, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:17 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x700, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x804) 03:41:17 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xd, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:17 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:17 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x6800000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:17 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x900, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:17 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x900, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:17 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xe, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x806) 03:41:17 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:17 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x6c00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:17 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xa00, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:17 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x10, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:17 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xa00, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x808) 03:41:17 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:17 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x7400000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:17 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xb00, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:17 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x11, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:17 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xb00, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x811) 03:41:17 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xa802, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:17 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xc00, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:18 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x7a00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:18 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x12, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:18 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xc00, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x817) 03:41:18 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xd00, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:18 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xff0f000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:18 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xa902, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:18 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x25, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:18 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xd00, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:18 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xe00, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:18 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x48, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x820) 03:41:18 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xffff000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:18 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:18 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xe00, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:18 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1100, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:18 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xffffffff00000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:18 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4c, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x829) 03:41:18 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xf701, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:18 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1200, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:18 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x1100, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x82c) 03:41:18 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xffffffffff600000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:18 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x68, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:18 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x80000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:18 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x1200, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:18 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1a00, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:18 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:18 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x2}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:18 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x6c, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x835) 03:41:19 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x74, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:19 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x2500, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:19 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x14c0000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:19 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x1a00, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:19 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x3}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:19 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:19 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7a, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x83e) 03:41:19 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x2500, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:19 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x4}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:19 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:19 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:19 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:19 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x300, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x841) 03:41:19 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4800, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:19 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x5}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:19 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x500, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:19 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:19 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4800, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x846) 03:41:19 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x6}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:19 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:19 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4c00, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:19 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x600, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:19 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:19 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x700, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:19 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4c00, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:19 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x7}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:19 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x60ff, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x84f) 03:41:20 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x900, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:20 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x6800, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:20 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:20 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x60ff, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:20 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x8}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:20 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xa00, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x854) 03:41:20 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x6c00, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:20 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:20 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6800, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:20 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x7400, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:20 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x9}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x87e) 03:41:20 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xb00, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:20 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x8020000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:20 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6c00, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x880) 03:41:20 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:20 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xc00, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:20 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x7600, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:20 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xa}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:20 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xd00, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:20 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7400, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:20 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x7a00, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x882) 03:41:20 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:20 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xb}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:20 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xe00, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:20 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7600, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:20 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x9600, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:20 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xb000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x884) 03:41:20 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x1100, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:21 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xff0f, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:21 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xc}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:21 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7a00, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:21 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xc000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:21 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x1200, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:21 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x100020, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:21 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xd}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:21 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x9600, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x889) 03:41:21 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xd000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:21 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x400000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:21 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xe}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:21 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xff0f, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:21 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x2500, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:21 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x50e000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x89a) 03:41:21 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xe000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:21 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x10}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:21 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x100020, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:21 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:21 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x89c) 03:41:21 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4800, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:21 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x607100, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:21 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x11000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:21 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x11}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:21 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x400000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:21 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4c00, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:21 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x70d000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:21 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x12000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:21 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x89e) 03:41:21 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x12}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:21 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x50e000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:22 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x60ff, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:22 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x716000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:22 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x8a7) 03:41:22 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x607100, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:22 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x14}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:22 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x760000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:22 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x6800, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:22 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x70d000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:22 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:22 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x25}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x8ad) 03:41:22 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x960000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:22 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x6c00, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:22 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:22 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x716000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x8b6) 03:41:22 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x43}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:22 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xd07000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:22 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7400, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:22 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x760000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:22 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xe05000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:22 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x25000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x8bf) 03:41:22 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x48}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:22 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7600, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:22 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:22 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x960000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:22 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x260f0000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:22 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x4c}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:22 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x8c2) 03:41:22 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7a00, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:23 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x2000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:23 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:23 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xd07000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:23 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x68}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x8cb) 03:41:23 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x3000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:23 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x9600, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:23 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xe05000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:23 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:23 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x6c}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:23 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x8d4) 03:41:23 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xff0f, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:23 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x1000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:23 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x74}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:23 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:23 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x5000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x8d7) 03:41:23 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:23 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x7a}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:23 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x2000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:23 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x100020, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:23 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x6000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:23 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x8dc) 03:41:23 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x56010000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:23 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x300}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:23 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x3000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:23 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x7000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:24 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x400000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x8e5) 03:41:24 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:24 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x500}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:24 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x57010000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:24 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x50e000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:24 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x5c000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:24 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:24 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x600}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:24 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x5000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x8ea) 03:41:24 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x607100, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:24 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:24 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x9000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x914) 03:41:24 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x60000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:24 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x700}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:24 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:24 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xa000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:24 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x70d000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x916) 03:41:24 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x900}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:24 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:24 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x8000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:24 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xb000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:24 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x716000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x918) 03:41:24 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xa00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:24 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:24 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x9000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x91a) 03:41:25 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xc000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:25 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x760000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:25 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xb00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:25 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:25 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xa000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x91f) 03:41:25 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x960000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:25 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xd000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:25 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:25 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xc00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:25 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xb000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:25 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xd07000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:25 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xe000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:25 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xd00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:25 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x930) 03:41:25 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xc000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:25 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x10000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:25 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xe05000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:25 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x97ffffff, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:25 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xd000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:25 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xe00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:25 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x1000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x932) 03:41:25 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xa8020000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:25 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x11000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:25 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x12000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:25 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xe000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:25 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x2000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:25 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x1100}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:25 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xa9020000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x934) 03:41:26 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1a000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:26 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x3000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:26 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x10000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:26 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x1200}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:26 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:26 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x93d) 03:41:26 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x11000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:26 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x20001000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:26 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xebffffff, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:26 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x1400}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:26 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x12000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:26 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x5000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:26 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x25000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:26 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x2000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x943) 03:41:26 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:26 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x1a000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:26 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x40000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:26 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x6000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:26 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x2500}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:26 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xf7010000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x94c) 03:41:26 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x20001000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:26 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:26 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x48000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:26 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x4000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:26 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xf9fdffff, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:26 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4c000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:26 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x25000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:26 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x955) 03:41:26 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x8000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:27 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x4300}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:27 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x68000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:27 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x958) 03:41:27 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x9000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:27 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x4800}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:27 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x6c000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x961) 03:41:27 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x40000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:27 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:27 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xa000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:27 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x74000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x96a) 03:41:27 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x4c00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:27 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x48000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:27 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:27 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xb000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:27 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4c000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:27 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x7a000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x96d) 03:41:27 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:27 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x60ff}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:27 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xc000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:27 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xff0f0000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:27 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x68000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:27 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:27 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x6800}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:27 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xd000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x972) 03:41:28 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6c000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:28 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xff600000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:28 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xe000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:28 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:28 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x6c00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:28 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x10000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x97b) 03:41:28 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x7400}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:28 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x74000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:28 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x10000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:28 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:28 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x315655550000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:28 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7a000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x980) 03:41:28 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x11000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:28 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x7600}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:28 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffeb, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:28 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x12000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:28 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xff0f0000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:28 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x400000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x9aa) 03:41:28 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x20001000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:28 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:28 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xff600000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:28 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x7a00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:28 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x5555562ee000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:28 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x25000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:28 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x9ac) 03:41:28 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:29 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x10000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:29 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x9600}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:29 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x555556310000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:29 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x40000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:29 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:29 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xff0f}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:29 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x400000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:29 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x60ffffffffff, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x9ae) 03:41:29 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x48000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:29 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x5555565e5000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:29 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x80000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:29 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x760000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:29 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x100020}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:29 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4c000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x9b0) 03:41:29 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x555556607000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:29 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:29 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x400000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:29 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x68000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:29 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x7ffffffff000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:29 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x9b5) 03:41:29 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x60ffffffffff, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:29 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x6c000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:29 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x960000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:29 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x50e000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:29 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:29 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x74000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:29 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x760000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x9c6) 03:41:30 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x10002000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:30 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x14c000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:30 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x607100}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:30 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7ffffffff000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x9c8) 03:41:30 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:30 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7a000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:30 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x60710000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:30 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x70d000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:30 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x960000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x9ca) 03:41:30 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xff0f0000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:30 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xd0700000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:30 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:30 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x10002000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:30 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x716000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:30 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xff600000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:30 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xe02e5655550000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x9d3) 03:41:30 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:30 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x400000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:30 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x505e5655550000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:30 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x760000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x9d9) 03:41:30 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xe0500000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:30 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:30 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x60710000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:30 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x5555558fa000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:30 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x80ffff}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:30 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x9e2) 03:41:30 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x55555591c000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:30 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:31 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xf0ffffff7f0000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:31 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x70605655550000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:31 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x60ffffffffff, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:31 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:31 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x100000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:31 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xd0700000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:31 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x960000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:31 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x760000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x9eb) 03:41:31 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xd07000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:31 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:31 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x200000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:31 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7ffffffff000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:31 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xe0500000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x9ee) 03:41:31 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x300000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:31 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x802000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:31 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xe05000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:31 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x960000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:31 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xf0ffffff7f0000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0x9f7) 03:41:31 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x400000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:31 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:31 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x1000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:31 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x10002000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:31 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x100000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:31 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x2000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:31 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa00) 03:41:31 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x500000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:31 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:31 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x60710000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:32 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x600000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:32 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xa08f5555550000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa03) 03:41:32 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x200000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:32 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x3000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:32 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xb00000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:32 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x4000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:32 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x700000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:32 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xc0915555550000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:32 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x300000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa08) 03:41:32 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x5000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:32 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xc00000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:32 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x800000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:32 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xd0700000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:32 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x400000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa11) 03:41:32 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x6000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:32 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x900000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:32 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xd00000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:32 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x500000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:32 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xe0500000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa16) 03:41:32 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xa00000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:32 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xf0ffffff7f0000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:32 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x600000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:32 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xe00000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:32 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x7000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:32 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xb00000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa40) 03:41:32 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x700000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:33 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x100000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:33 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:33 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xc00000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:33 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x8000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:33 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x800000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa42) 03:41:33 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1100000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:33 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xd00000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:33 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x200000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:33 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x9000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:33 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x900000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:33 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1200000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:33 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x300000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:33 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xa00000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:33 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xe00000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa44) 03:41:33 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x400000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:33 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xa000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:33 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:33 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xb00000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:33 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1000000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa46) 03:41:33 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xc00000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:33 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x500000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:33 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xb000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:33 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa4b) 03:41:33 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1100000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:33 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x600000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:33 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xd00000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:33 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xc000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:34 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:34 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1200000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:34 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x700000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:34 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xd000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:34 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xe00000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa5c) 03:41:34 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x1a00000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:34 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x2500000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:34 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x800000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:34 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xe000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:34 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x2500000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:34 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x1000000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:34 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x260f000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa5e) 03:41:34 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x900000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:34 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x10000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:34 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x1100000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:34 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4000000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:34 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa60) 03:41:34 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x11000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:34 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xa00000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:34 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x1200000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:34 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4800000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:34 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:34 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa69) 03:41:34 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x12000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:34 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:34 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xb00000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:34 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x1a00000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:34 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x4c00000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:35 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xc00000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:35 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x14000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:35 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x2500000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa6f) 03:41:35 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:35 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x6800000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:35 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xd00000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:35 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4000000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:35 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x20000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa78) 03:41:35 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x5601000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:35 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x6c00000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:35 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xe00000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:35 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4800000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:35 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x1000000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:35 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x20001000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa81) 03:41:35 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x5701000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:35 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x7400000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:35 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x1100000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:35 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4c00000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:35 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x25000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:35 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa84) 03:41:35 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x7a00000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:35 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x1200000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:35 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x5c00000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:35 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x40000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:35 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6800000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:35 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xff0f000000000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:35 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x2500000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa8d) 03:41:36 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x6000000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:36 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6c00000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:36 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xffffffff00000000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:36 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4000000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:36 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x43000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:36 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa96) 03:41:36 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4800000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:36 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7400000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:36 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xffffffffff600000, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:36 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x48000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:36 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa99) 03:41:36 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x4c00000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:36 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7a00000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:36 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x2}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:36 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:36 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x4c000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:36 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xff0f000000000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xa9e) 03:41:36 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x6800000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:36 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x3}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:36 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x68000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:36 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:36 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xffffffff00000000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:36 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x6c00000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xaa7) 03:41:36 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:36 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:36 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x6c000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:37 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xffffffffff600000, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:37 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7400000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:37 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x5}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xaac) 03:41:37 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:37 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x74000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:37 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x7a00000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:37 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x6}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:37 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xad6) 03:41:37 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xa802000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:37 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xff0f000000000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:37 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x7a000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:37 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x7}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:37 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0xc, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:37 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xffffffff00000000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:37 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x8}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xad8) 03:41:37 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xa902000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:37 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xff0f0000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:37 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:37 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0xffffffffff600000, 0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:37 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x9}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xada) 03:41:37 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xebffffff00000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:37 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:37 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xff600000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:37 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xa}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:37 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x32, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:37 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:38 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0xa}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xadc) 03:41:38 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:38 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xb}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:38 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xffff0000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:38 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xae1) 03:41:38 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xf701000000000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:38 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xc}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:38 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xffff8000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:38 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x3}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:38 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:38 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xf9fdffff00000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xaf2) 03:41:38 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x4}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:38 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xd}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:38 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x10000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:38 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:38 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:38 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xe}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:38 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x5}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:38 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x400000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xaf4) 03:41:38 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:38 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x10}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:38 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x6}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:38 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:38 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x555557125000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:38 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xaf6) 03:41:39 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x7}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:39 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x11}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:39 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:39 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x555557147000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:39 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:39 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x12}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xaff) 03:41:39 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x8}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:39 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:39 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1a}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:39 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:39 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x60ffffffffff}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:39 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb05) 03:41:39 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x9}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:39 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x25}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:39 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:39 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x760000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:39 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb0e) [ 854.242451][T15208] __ntfs_error: 11 callbacks suppressed [ 854.242461][T15208] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:39 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xa}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:39 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x48}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:39 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x7ffffffff000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:39 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:39 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:39 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4c}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:39 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xb}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:39 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb17) 03:41:39 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x960000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:39 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:40 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xc}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:40 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x68}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 854.683763][T15245] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:40 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x1000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb1a) 03:41:40 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:40 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xd}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:40 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:40 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x6c}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:40 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x10002000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:40 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb23) 03:41:40 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xe}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 855.071416][T15276] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:40 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x74}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:40 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x40000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:40 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x10}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:40 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb2c) 03:41:40 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:40 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x11}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:40 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x7a}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:40 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x50125755550000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:40 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:40 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x12}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:40 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb2f) 03:41:40 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x300}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 855.573822][T15317] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:41 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x60710000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:41 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:41 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x6, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:41 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x25}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb34) 03:41:41 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x500}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 855.858453][T15344] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:41 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x70145755550000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:41 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:41 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x48}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb3d) 03:41:41 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x600}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:41 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:41 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x4c}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:41 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x80ffff00000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:41 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:41 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x700}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb42) 03:41:41 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x900}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:41 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xd0700000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:41 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 856.343025][T15383] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:41 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x68}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:41 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xa00}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb6d) 03:41:41 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x8, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:41 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x6c}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:41 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:41 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xe0500000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:42 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xb00}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:42 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x74}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:42 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:42 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xf0ffffff7f0000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 856.771890][T15421] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:42 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xc00}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb6f) 03:41:42 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:42 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x7a}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:42 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:42 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x100000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 857.035337][T15444] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:42 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xd00}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb71) 03:41:42 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x300}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:42 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x200000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:42 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xe00}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:42 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:42 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xa, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:42 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x500}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:42 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb73) 03:41:42 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1100}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:42 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x600}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:42 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x300000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 857.496740][T15479] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:42 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1200}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:42 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:43 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x700}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:43 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xb, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb77) 03:41:43 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1a00}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:43 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x400000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:43 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:43 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x900}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb88) [ 857.898080][T15517] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:43 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x500000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:43 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x2500}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:43 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:43 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xa00}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb8a) 03:41:43 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xc, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:43 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:43 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x600000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:43 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:43 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xb00}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:43 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4800}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb8c) 03:41:43 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:43 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xd, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:43 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4c00}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:43 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x700000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:43 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xc00}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb95) 03:41:43 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:44 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x60ff}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:44 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x800000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:44 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xd00}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:44 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xe, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:44 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x6800}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:44 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x900000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xb9b) 03:41:44 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:44 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xe00}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:44 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x6c00}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:44 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xa00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xba4) 03:41:44 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x1100}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:44 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x10, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:44 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:44 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x7400}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:44 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x1200}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 859.271246][T15649] __ntfs_error: 3 callbacks suppressed [ 859.271256][T15649] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:44 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xb00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xbad) 03:41:44 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x7600}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:44 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:44 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2500}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:44 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x11, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:44 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xbb0) 03:41:44 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xc00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:44 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x7a00}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:44 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:45 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x4000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:45 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xd00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 859.718093][T15686] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:45 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xbb9) 03:41:45 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x9600}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:45 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x4800}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:45 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xff0f}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:45 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x12, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:45 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x4c00}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xbc2) 03:41:45 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xe00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:45 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:45 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x100020}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 860.149377][T15720] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xbc5) 03:41:45 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x60ff}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:45 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x1000000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:45 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:45 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x400000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:45 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x25, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:45 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x6800}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:45 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x50e000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xbca) 03:41:45 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:45 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x1100000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:45 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x6c00}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:45 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x607100}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:45 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xbd3) 03:41:46 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x1200000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:46 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x48, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:46 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x70d000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:46 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x7400}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:46 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a00, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:46 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x1400000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xbd8) [ 860.919938][T15796] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:46 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x716000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:46 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x7600}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:46 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:46 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4c, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:46 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x2000000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:46 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x7a00}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:46 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x760000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:46 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc03) 03:41:46 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x960000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:46 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x2500000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 861.289825][T15827] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:46 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x9600}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:46 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xd07000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:46 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:46 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x4000000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:46 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x5c, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc05) 03:41:46 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xe05000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:47 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:47 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xff0f}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:47 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x4300000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc07) 03:41:47 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 861.723750][T15864] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:47 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x100020}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:47 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x60ff, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:47 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x60, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:47 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x400000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc09) 03:41:47 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x4800000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:47 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x2000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:47 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:47 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x50e000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:47 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x3000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc0d) 03:41:47 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x68, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:47 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x4c00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:47 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:47 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:47 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x607100}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:47 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc1e) 03:41:47 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x6800000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:47 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x5000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:47 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x6c, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:47 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x70d000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:47 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc20) 03:41:47 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7600, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:48 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x6c00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:48 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x6000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:48 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x716000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:48 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x74, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:48 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x7000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:48 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:48 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x7400000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc22) 03:41:48 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x760000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:48 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x8000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:48 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x7a, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:48 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x9600, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:48 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x7a00000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc2b) 03:41:48 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x960000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:48 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x9000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:48 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xff0f, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:48 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x14c, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:48 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xd07000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:48 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xff0f000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc31) 03:41:48 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xa000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:48 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xe05000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 863.446035][T16030] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:48 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x100020, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:48 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xb000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:48 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xffff000000000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:48 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc3a) 03:41:48 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x156, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:49 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x1000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:49 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x400000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:49 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xc000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:49 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xffffffff00000000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 863.755899][T16061] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:49 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xd000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:49 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc43) 03:41:49 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x50e000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:49 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xffffffffff600000}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:49 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x157, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:49 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x3000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:49 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xe000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:49 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x607100, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc46) 03:41:49 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x10000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:49 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x4000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 864.193937][T16090] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:49 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x70d000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:49 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x2}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc4f) 03:41:49 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x11000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:49 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1f7, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:49 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x3}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc58) 03:41:49 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x5000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:49 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x716000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:49 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x12000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:50 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x6000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:50 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x5}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc5b) 03:41:50 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x760000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:50 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1a000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:50 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x208, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:50 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x8}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:50 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x7000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:50 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x960000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:50 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x20001000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc60) 03:41:50 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0xc}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:50 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x8000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 864.996100][T16170] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:50 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xd07000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:50 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x9000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:50 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2a8, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:50 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x25000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc69) 03:41:50 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0xd}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:50 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xa000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:50 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe05000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:50 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x40000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:50 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xb000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc6e) 03:41:50 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:50 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2a9, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:50 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x48000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:50 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x900}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:51 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xc000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc99) 03:41:51 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4c000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:51 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:51 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0xa00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:51 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x68000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:51 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x300, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc9b) 03:41:51 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xd000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:51 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:51 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0xb00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:51 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x6c000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 865.990804][T16256] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc9d) 03:41:51 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xe000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:51 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:51 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x74000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:51 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x500, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:51 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:51 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x10000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:51 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0xc00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xc9f) 03:41:51 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x7a000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 866.407654][T16291] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:51 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:51 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x11000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:52 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:52 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xff0f0000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:52 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x600, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xca3) 03:41:52 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0xd00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:52 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x12000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 866.811211][T16326] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:52 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xff600000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:52 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xcb4) 03:41:52 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0xe00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:52 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x20001000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:52 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x700, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:52 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x10000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:52 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:52 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x1300}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xcb6) [ 867.162585][T16356] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:52 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x25000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:52 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x315655550000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:52 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:52 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x2}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:52 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x40000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:52 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xcb8) 03:41:52 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x400000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:52 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x802, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:52 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:53 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x48000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:53 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x5555562ee000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xcc1) 03:41:53 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x3}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 867.763900][T16395] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:53 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:53 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x555556310000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:53 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x4c000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:53 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x900, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:53 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x60ffffffffff}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xcc7) [ 868.103209][T16423] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:53 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:53 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x68000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:53 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x4}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:53 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x760000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:53 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xa00, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:53 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x6c000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:53 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xcd0) 03:41:53 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x5}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:53 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x7ffffffff000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:53 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 868.510456][T16452] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:53 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x74000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:54 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x6}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xcd9) 03:41:54 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xb00, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:54 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x960000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:54 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x7a000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:54 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:54 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x7}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xcdc) 03:41:54 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x10002000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 868.933078][T16484] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:54 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:54 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xff0f0000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:54 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xc00, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:54 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xff600000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:54 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x60710000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xce5) 03:41:54 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x8}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:54 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 869.252488][T16512] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:54 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x400000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:54 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x9}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:54 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xd0700000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xcee) 03:41:54 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x20001000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:54 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xd00, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:54 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xe02e5655550000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:54 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0xa}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:54 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xe0500000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:54 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xcf1) 03:41:55 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x5555558fa000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:55 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:55 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xf0ffffff7f0000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:55 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0xb}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:55 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xe00, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:55 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x55555591c000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:55 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:55 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x100000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xcf6) 03:41:55 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0xc}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:55 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x60ffffffffff}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:55 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0xf26, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:55 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:55 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x200000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:55 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0xd}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xcff) 03:41:55 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x760000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:55 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:55 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x300000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:55 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:55 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0xe}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:55 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x7ffffffff000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:55 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x400000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd04) 03:41:55 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:55 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x960000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:56 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1100, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd2f) 03:41:56 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x10}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:56 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x500000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:56 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:56 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x10002000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:56 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x600000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:56 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x11}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:56 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1200, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd31) 03:41:56 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x60710000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:56 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:56 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x700000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:56 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x12}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd33) 03:41:56 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:56 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x800000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:56 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xa08f5555550000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:56 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:56 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x14}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd35) 03:41:56 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xc0915555550000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:56 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xff0f0000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:56 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x900000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:56 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:56 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd39) 03:41:56 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x25}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:57 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xd0700000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:57 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xa00000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:57 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xff600000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd4a) 03:41:57 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xe0500000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:57 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x43}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:57 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2010, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:57 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xb00000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:57 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xf0ffffff7f0000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:57 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd4c) 03:41:57 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x48}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:57 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xc00000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:57 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x100000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:57 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x400000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:57 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x2500, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd4e) 03:41:57 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x4c}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:57 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xd00000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:57 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x200000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:57 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5555565e5000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:57 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xe00000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:57 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x68}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:57 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x260f, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:57 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x300000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd57) 03:41:57 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x555556607000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:58 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1000000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:58 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x6c}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd5d) 03:41:58 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x60ffffffffff, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:58 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:58 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1100000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:58 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x400000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:58 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x74}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd66) 03:41:58 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1200000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:58 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x760000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:58 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x500000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:58 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x7a}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:58 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x1a00000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd6f) 03:41:58 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7ffffffff000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:58 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:58 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x600000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:58 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x300}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:58 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x2500000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:58 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x700000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 873.360325][T16890] __ntfs_error: 2 callbacks suppressed [ 873.360334][T16890] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:58 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd72) 03:41:58 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x960000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:58 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x500}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:58 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4000000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:58 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x800000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:59 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x600}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd7b) 03:41:59 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4800, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:59 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4800000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:59 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x900000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:59 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x10002000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:59 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x4c00000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:59 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x700}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd84) 03:41:59 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x505e5655550000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:59 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xa00000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 873.940551][T16935] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:59 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x6800000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:59 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x60710000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:59 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:59 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x900}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd87) 03:41:59 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xb00000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:59 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x6c00000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:59 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x70605655550000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 874.342339][T16972] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:41:59 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0xa00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:41:59 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd8c) 03:41:59 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xc00000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:41:59 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x7400000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:59 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xd0700000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:59 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x7a00000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:41:59 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x4c01, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:41:59 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0xb00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:42:00 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xd00000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:42:00 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe0500000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:42:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd95) 03:42:00 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0xe00000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:42:00 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xff0f000000000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:42:00 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0xc00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:42:00 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xf0ffffff7f0000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 874.851808][T17013] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 03:42:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xd9a) 03:42:00 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xffffffff00000000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:42:00 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x1000000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:42:00 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x5601, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:42:00 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0xd00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:42:00 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:42:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xdc5) 03:42:00 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0xffffffffff600000}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:42:00 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0xe00}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:42:00 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x1100000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:42:00 executing program 1: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:42:00 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x200000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 03:42:00 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x5701, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:42:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xdc7) 03:42:00 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x1100}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 03:42:00 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x1200000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) [ 875.503214][T17078] kasan: CONFIG_KASAN_INLINE enabled 03:42:00 executing program 4: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x300000000000000, 0x18, 0x18, 0x2, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{}]}]}}, &(0x7f0000001480)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 875.552384][T17078] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 875.587146][T17078] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 875.594344][T17078] CPU: 1 PID: 17078 Comm: syz-executor.1 Not tainted 5.2.0-rc5+ #4 [ 875.602243][T17078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.612340][T17078] RIP: 0010:btf_struct_resolve+0x42d/0xfc0 [ 875.618196][T17078] Code: e8 03 42 80 3c 28 00 4d 89 e7 74 08 48 89 df e8 a9 5b 25 00 4c 8b 23 49 8d 5c 24 04 48 89 d8 48 c1 e8 03 48 89 85 68 ff ff ff <42> 0f b6 04 28 84 c0 48 8b 55 c8 0f 85 19 04 00 00 4c 8d 6a fc 48 [ 875.637904][T17078] RSP: 0018:ffff88804d2475f0 EFLAGS: 00010247 [ 875.643963][T17078] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000040000 [ 875.651936][T17078] RDX: ffffc90007ffa000 RSI: 0000000000000c77 RDI: 0000000000000c78 [ 875.659910][T17078] RBP: ffff88804d247690 R08: ffffffff81897f28 R09: ffff88804d24751c [ 875.667872][T17078] R10: 0000000000000009 R11: 1ffff11015d66bf7 R12: 0000000000000000 [ 875.675838][T17078] R13: dffffc0000000000 R14: ffff88808a169540 R15: ffff8880a6f40600 [ 875.683896][T17078] FS: 00007f0afb1c5700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 875.692813][T17078] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 875.699381][T17078] CR2: 0000000000000000 CR3: 0000000089c03000 CR4: 00000000001406e0 [ 875.707354][T17078] Call Trace: [ 875.710669][T17078] btf_resolve+0x3ed/0xda0 [ 875.715111][T17078] ? btf_sec_info_cmp+0x110/0x110 [ 875.720132][T17078] ? kasan_kmalloc+0x9/0x10 [ 875.724625][T17078] ? __kmalloc_node+0x4d/0x60 [ 875.729306][T17078] btf_new_fd+0x216a/0x37b0 [ 875.733842][T17078] ? __might_fault+0xf9/0x160 [ 875.738516][T17078] ? btf_release+0xd0/0xd0 [ 875.742951][T17078] __do_sys_bpf+0x1212/0xc5d0 [ 875.747613][T17078] ? __bfs+0x550/0x550 [ 875.751673][T17078] ? validate_mm+0x8ae/0x9b0 [ 875.756292][T17078] ? handle_futex_death+0x3f0/0x3f0 [ 875.761488][T17078] ? __bpf_prog_put_rcu+0x320/0x320 [ 875.766695][T17078] ? __lock_acquire+0xcf7/0x1a40 [ 875.771661][T17078] ? mmap_region+0x11ff/0x1d80 [ 875.776423][T17078] ? check_preemption_disabled+0x47/0x280 [ 875.782135][T17078] ? trace_lock_acquire+0x190/0x190 [ 875.787325][T17078] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 875.793904][T17078] ? userfaultfd_unmap_prep+0x490/0x490 [ 875.799441][T17078] ? trace_event_raw_event_lock_acquire+0x2c0/0x2c0 [ 875.806206][T17078] ? __might_fault+0xf9/0x160 [ 875.810974][T17078] ? kasan_check_read+0x11/0x20 [ 875.815913][T17078] ? _copy_to_user+0xca/0xf0 [ 875.820508][T17078] ? put_timespec64+0x106/0x150 [ 875.825347][T17078] ? ktime_get_raw+0xf0/0xf0 [ 875.829942][T17078] ? prepare_exit_to_usermode+0x1e1/0x4f0 [ 875.835700][T17078] ? __x64_sys_clock_gettime+0x1c5/0x220 [ 875.841328][T17078] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 875.846814][T17078] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 875.852533][T17078] ? do_syscall_64+0x1d/0x140 [ 875.857230][T17078] __x64_sys_bpf+0x7a/0x90 [ 875.861668][T17078] do_syscall_64+0xfe/0x140 [ 875.866209][T17078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 875.872135][T17078] RIP: 0033:0x4592c9 [ 875.876038][T17078] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 875.895643][T17078] RSP: 002b:00007f0afb1c4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 03:42:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xdc9) 03:42:01 executing program 3: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x2500000000000000}}, &(0x7f0000001480)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 03:42:01 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x4, 0x1200}]}}, &(0x7f0000001480)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 875.904128][T17078] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00000000004592c9 [ 875.912095][T17078] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 875.920322][T17078] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 875.928306][T17078] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0afb1c56d4 [ 875.936277][T17078] R13: 00000000004bf4d3 R14: 00000000004d0aa0 R15: 00000000ffffffff [ 875.944262][T17078] Modules linked in: [ 875.957368][T17078] ---[ end trace d23f17e3440201b4 ]--- [ 875.963175][T17078] RIP: 0010:btf_struct_resolve+0x42d/0xfc0 [ 875.969229][T17082] kobject: 'loop5' (00000000a6991d00): kobject_uevent_env [ 875.976404][T17082] kobject: 'loop5' (00000000a6991d00): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 875.986998][T17078] Code: e8 03 42 80 3c 28 00 4d 89 e7 74 08 48 89 df e8 a9 5b 25 00 4c 8b 23 49 8d 5c 24 04 48 89 d8 48 c1 e8 03 48 89 85 68 ff ff ff <42> 0f b6 04 28 84 c0 48 8b 55 c8 0f 85 19 04 00 00 4c 8d 6a fc 48 03:42:01 executing program 5: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x5c00, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/17, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(0xffffffffffffffff, 0x11b, 0x5, &(0x7f0000000080)=0x8, 0x385) futex(&(0x7f0000000140)=0x6, 0x1, 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000001c0)=0x1, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x142, 0x44040) 03:42:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp\x00') readv(r0, &(0x7f0000000000)=[{&(0x7f0000000440)=""/4096, 0x1000}], 0xdcb) [ 876.003751][ T3879] kobject: 'loop4' (00000000efc77ab6): kobject_uevent_env [ 876.046745][ T3879] kobject: 'loop4' (00000000efc77ab6): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 876.079626][T17078] RSP: 0018:ffff88804d2475f0 EFLAGS: 00010247 [ 876.087993][ T3879] kobject: 'loop3' (000000003e9121d9): kobject_uevent_env [ 876.103008][T17078] RAX: 0000000000000000 RBX: 0000000000000004 RCX: 0000000000040000 [ 876.114577][T17102] kobject: 'loop5' (00000000a6991d00): kobject_uevent_env [ 876.123135][T17078] RDX: ffffc90007ffa000 RSI: 0000000000000c77 RDI: 0000000000000c78 [ 876.133231][ T3879] kobject: 'loop3' (000000003e9121d9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 876.134580][T17102] kobject: 'loop5' (00000000a6991d00): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 876.143874][T17078] RBP: ffff88804d247690 R08: ffffffff81897f28 R09: ffff88804d24751c [ 876.161882][ T3879] kobject: 'loop0' (00000000dcbea5be): kobject_uevent_env [ 876.174167][ T3879] kobject: 'loop0' (00000000dcbea5be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 876.183191][T17078] R10: 0000000000000009 R11: 1ffff11015d66bf7 R12: 0000000000000000 [ 876.195429][T17078] R13: dffffc0000000000 R14: ffff88808a169540 R15: ffff8880a6f40600 [ 876.200083][ T3879] kobject: 'loop3' (000000003e9121d9): kobject_uevent_env [ 876.212562][T17078] FS: 00007f0afb1c5700(0000) GS:ffff8880aeb00000(0000) knlGS:0000000000000000 [ 876.214590][ T3879] kobject: 'loop3' (000000003e9121d9): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 876.232151][T17102] kobject: 'loop5' (00000000a6991d00): kobject_uevent_env [ 876.233621][T17078] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 876.242597][T17102] kobject: 'loop5' (00000000a6991d00): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 876.247181][T17078] CR2: 00007f76e3c8f6f0 CR3: 0000000089c03000 CR4: 00000000001406e0 [ 876.257937][ T3879] kobject: 'loop0' (00000000dcbea5be): kobject_uevent_env [ 876.269702][T17078] Kernel panic - not syncing: Fatal exception [ 876.275162][ T3879] kobject: 'loop0' (00000000dcbea5be): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 876.279310][T17078] Kernel Offset: disabled [ 876.293783][T17078] Rebooting in 86400 seconds..