0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:37 executing program 2 (fault-call:2 fault-nth:57): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:37 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x274, 0x0) 15:23:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x4c}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:37 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) [ 575.316599][T24950] FAULT_INJECTION: forcing a failure. [ 575.316599][T24950] name failslab, interval 1, probability 0, space 0, times 0 15:23:37 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) [ 575.391824][T24950] CPU: 0 PID: 24950 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 575.399410][T24950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 575.409459][T24950] Call Trace: [ 575.412759][T24950] dump_stack+0xf5/0x159 [ 575.417016][T24950] should_fail.cold+0xa/0x1a [ 575.421616][T24950] __should_failslab+0xee/0x130 [ 575.426470][T24950] should_failslab+0x9/0x14 [ 575.430976][T24950] kmem_cache_alloc_trace+0x2a/0x5d0 [ 575.436260][T24950] ? __kmalloc_node+0x38/0x50 [ 575.440939][T24950] btrfs_mount_root+0xf7/0xb00 [ 575.445711][T24950] ? __tsan_write8+0x18/0x40 [ 575.450298][T24950] ? legacy_parse_param+0xec/0x5f0 [ 575.455415][T24950] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 575.461132][T24950] ? __tsan_read8+0x15/0x30 [ 575.465635][T24950] ? btrfs_decode_error+0x60/0x60 [ 575.470657][T24950] legacy_get_tree+0x7e/0xf0 [ 575.475244][T24950] vfs_get_tree+0x58/0x200 [ 575.479659][T24950] fc_mount+0x20/0x80 [ 575.483636][T24950] vfs_kern_mount.part.0+0xe6/0xf0 15:23:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x60}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 575.488742][T24950] vfs_kern_mount+0x49/0x70 [ 575.493248][T24950] btrfs_mount+0x250/0xf41 [ 575.497677][T24950] ? __read_once_size.constprop.0+0x12/0x20 [ 575.503564][T24950] ? __tsan_read4+0x15/0x30 [ 575.508068][T24950] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 575.514396][T24950] ? refcount_sub_and_test_checked+0xc8/0x190 [ 575.520578][T24950] ? btrfs_remount+0x930/0x930 [ 575.525347][T24950] ? btrfs_remount+0x930/0x930 [ 575.530108][T24950] legacy_get_tree+0x7e/0xf0 [ 575.534691][T24950] ? legacy_get_tree+0x7e/0xf0 [ 575.539447][T24950] vfs_get_tree+0x58/0x200 [ 575.543862][T24950] do_mount+0x1031/0x1560 [ 575.548195][T24950] ksys_mount+0xe8/0x160 [ 575.552434][T24950] __x64_sys_mount+0x70/0x90 [ 575.557026][T24950] do_syscall_64+0xcf/0x2f0 [ 575.561531][T24950] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 575.567501][T24950] RIP: 0033:0x45c47a [ 575.571392][T24950] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 575.590995][T24950] RSP: 002b:00007f4178584a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 575.599404][T24950] RAX: ffffffffffffffda RBX: 00007f4178584b40 RCX: 000000000045c47a [ 575.607387][T24950] RDX: 00007f4178584ae0 RSI: 00000000200003c0 RDI: 00007f4178584b00 [ 575.615353][T24950] RBP: 0000000000000001 R08: 00007f4178584b40 R09: 00007f4178584ae0 [ 575.623425][T24950] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 575.631390][T24950] R13: 00000000004c8b25 R14: 00000000004dfbc8 R15: 0000000000000004 15:23:37 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x275, 0x0) [ 575.639575][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 575.645420][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 575.781770][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 575.787653][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 575.793416][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 575.799145][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 575.861770][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 575.867561][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:23:38 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) socket$inet_dccp(0x2, 0x6, 0x0) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) connect$rxrpc(r5, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffeab, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYRESHEX=r1], 0x18}}], 0x1, 0x4048000) close(r5) r6 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r6, 0x110, 0x3) connect$rxrpc(r6, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r6, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r6) getsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xfffffffffffffd81) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r7 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r7, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=[@decrefs], 0x0, 0x0, 0x0}) sync_file_range(r7, 0x2ad3, 0x2, 0x2) r8 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r8, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) ioctl$RTC_UIE_ON(r3, 0x7003) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:38 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x276, 0x0) 15:23:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x63}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:38 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:38 executing program 2 (fault-call:2 fault-nth:58): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:38 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:38 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x68}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 576.273760][T24986] FAULT_INJECTION: forcing a failure. [ 576.273760][T24986] name failslab, interval 1, probability 0, space 0, times 0 [ 576.309513][T24986] CPU: 0 PID: 24986 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 576.317089][T24986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 576.327134][T24986] Call Trace: [ 576.330415][T24986] dump_stack+0xf5/0x159 [ 576.334648][T24986] should_fail.cold+0xa/0x1a [ 576.339235][T24986] __should_failslab+0xee/0x130 [ 576.344101][T24986] should_failslab+0x9/0x14 [ 576.348595][T24986] __kmalloc_track_caller+0x4f/0x690 [ 576.353862][T24986] ? __tsan_read1+0x15/0x30 [ 576.358357][T24986] ? __tsan_read1+0x15/0x30 [ 576.362841][T24986] ? strcmp+0x5e/0x70 [ 576.366802][T24986] ? __tsan_read4+0x15/0x30 [ 576.371295][T24986] ? match_strdup+0x40/0x50 [ 576.375783][T24986] kmemdup_nul+0x3a/0x80 [ 576.380008][T24986] match_strdup+0x40/0x50 [ 576.384323][T24986] btrfs_mount_root+0x24f/0xb00 [ 576.389155][T24986] ? apic_timer_interrupt+0xa/0x20 [ 576.394250][T24986] ? __tsan_read4+0x24/0x30 [ 576.398737][T24986] ? legacy_parse_param+0xec/0x5f0 [ 576.403842][T24986] ? __tsan_read8+0x15/0x30 [ 576.408331][T24986] ? btrfs_decode_error+0x60/0x60 [ 576.413339][T24986] legacy_get_tree+0x7e/0xf0 [ 576.417915][T24986] vfs_get_tree+0x58/0x200 [ 576.422313][T24986] fc_mount+0x20/0x80 [ 576.426278][T24986] vfs_kern_mount.part.0+0xe6/0xf0 [ 576.431371][T24986] vfs_kern_mount+0x49/0x70 [ 576.435857][T24986] btrfs_mount+0x250/0xf41 [ 576.440259][T24986] ? __read_once_size.constprop.0+0x12/0x20 [ 576.446922][T24986] ? __tsan_read4+0x15/0x30 [ 576.451410][T24986] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 576.457636][T24986] ? refcount_sub_and_test_checked+0xc8/0x190 [ 576.463689][T24986] ? refcount_dec_and_test_checked+0x2c/0x40 [ 576.469654][T24986] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 576.475884][T24986] ? apparmor_capable+0x1c3/0x300 [ 576.480897][T24986] ? __tsan_read8+0x15/0x30 [ 576.485385][T24986] ? btrfs_remount+0x930/0x930 [ 576.490140][T24986] legacy_get_tree+0x7e/0xf0 [ 576.494714][T24986] ? legacy_get_tree+0x7e/0xf0 [ 576.499462][T24986] vfs_get_tree+0x58/0x200 [ 576.503864][T24986] do_mount+0x1031/0x1560 [ 576.508179][T24986] ? __sanitizer_cov_trace_pc+0x3f/0x50 [ 576.513727][T24986] ksys_mount+0xe8/0x160 [ 576.517954][T24986] __x64_sys_mount+0x70/0x90 [ 576.522540][T24986] do_syscall_64+0xcf/0x2f0 [ 576.527034][T24986] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 576.532908][T24986] RIP: 0033:0x45c47a [ 576.536787][T24986] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 576.556470][T24986] RSP: 002b:00007f4178584a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 576.564862][T24986] RAX: ffffffffffffffda RBX: 00007f4178584b40 RCX: 000000000045c47a 15:23:38 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x277, 0x0) [ 576.572821][T24986] RDX: 00007f4178584ae0 RSI: 00000000200003c0 RDI: 00007f4178584b00 [ 576.580861][T24986] RBP: 0000000000000001 R08: 00007f4178584b40 R09: 00007f4178584ae0 [ 576.588819][T24986] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 576.596772][T24986] R13: 00000000004c8b25 R14: 00000000004dfbc8 R15: 0000000000000004 15:23:38 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) [ 576.690979][T24984] __ntfs_warning: 62 callbacks suppressed [ 576.690994][T24984] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 15:23:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x6c}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x278, 0x0) [ 576.769685][T24984] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 576.803895][T24984] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 15:23:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x279, 0x0) [ 576.864712][T24984] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 15:23:39 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) connect$rxrpc(r5, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r5) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) sendmmsg(r6, &(0x7f0000000100), 0x5bd, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r6, 0x84, 0x4, &(0x7f00000001c0), &(0x7f0000000200)=0x4) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r7 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r7, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:39 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x74}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x27a, 0x0) 15:23:39 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:39 executing program 2 (fault-call:2 fault-nth:59): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:39 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x27b, 0x0) [ 577.459700][T25021] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 577.495966][T25020] FAULT_INJECTION: forcing a failure. [ 577.495966][T25020] name failslab, interval 1, probability 0, space 0, times 0 15:23:39 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x7a}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 577.516898][T25021] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 577.551083][T25021] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 577.570653][T25020] CPU: 1 PID: 25020 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 577.578223][T25020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 577.589154][T25020] Call Trace: [ 577.592452][T25020] dump_stack+0xf5/0x159 [ 577.596701][T25020] should_fail.cold+0xa/0x1a [ 577.601293][T25020] __should_failslab+0xee/0x130 [ 577.601767][T25021] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 577.606142][T25020] should_failslab+0x9/0x14 [ 577.618159][T25020] kmem_cache_alloc+0x29/0x5d0 [ 577.622932][T25020] ? __write_once_size.constprop.0+0x12/0x20 [ 577.628912][T25020] ? __write_once_size.constprop.0+0x12/0x20 [ 577.634886][T25020] ? __tsan_read4+0x15/0x30 [ 577.639392][T25020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 577.645631][T25020] ? __tsan_read1+0x15/0x30 [ 577.650131][T25020] getname_kernel+0x46/0x200 [ 577.654720][T25020] kern_path+0x29/0x60 [ 577.658792][T25020] lookup_bdev.part.0+0x3e/0x130 [ 577.663743][T25020] blkdev_get_by_path+0x70/0x110 [ 577.668683][T25020] btrfs_scan_one_device+0x56/0x3c0 [ 577.673889][T25020] btrfs_mount_root+0x274/0xb00 [ 577.678754][T25020] ? __tsan_read8+0x15/0x30 [ 577.683261][T25020] ? legacy_parse_param+0xec/0x5f0 [ 577.688379][T25020] ? __tsan_read8+0x15/0x30 [ 577.693061][T25020] ? btrfs_decode_error+0x60/0x60 [ 577.698082][T25020] legacy_get_tree+0x7e/0xf0 [ 577.702672][T25020] vfs_get_tree+0x58/0x200 [ 577.707086][T25020] fc_mount+0x20/0x80 [ 577.711062][T25020] vfs_kern_mount.part.0+0xe6/0xf0 [ 577.716182][T25020] vfs_kern_mount+0x49/0x70 [ 577.720684][T25020] btrfs_mount+0x250/0xf41 [ 577.725096][T25020] ? __read_once_size.constprop.0+0x12/0x20 [ 577.730983][T25020] ? __tsan_read4+0x15/0x30 [ 577.735487][T25020] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 577.741724][T25020] ? refcount_sub_and_test_checked+0xc8/0x190 [ 577.747795][T25020] ? refcount_dec_and_test_checked+0x2c/0x40 [ 577.753777][T25020] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 577.760017][T25020] ? apparmor_capable+0x1c3/0x300 [ 577.765038][T25020] ? __tsan_read8+0x15/0x30 [ 577.769542][T25020] ? btrfs_remount+0x930/0x930 [ 577.774511][T25020] legacy_get_tree+0x7e/0xf0 [ 577.779318][T25020] ? legacy_get_tree+0x7e/0xf0 [ 577.784098][T25020] vfs_get_tree+0x58/0x200 [ 577.788520][T25020] do_mount+0x1031/0x1560 [ 577.792850][T25020] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 577.798400][T25020] ksys_mount+0xe8/0x160 [ 577.802640][T25020] __x64_sys_mount+0x70/0x90 [ 577.807230][T25020] do_syscall_64+0xcf/0x2f0 [ 577.811736][T25020] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 577.817623][T25020] RIP: 0033:0x45c47a [ 577.821512][T25020] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 577.841118][T25020] RSP: 002b:00007f4178584a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 577.849532][T25020] RAX: ffffffffffffffda RBX: 00007f4178584b40 RCX: 000000000045c47a [ 577.857627][T25020] RDX: 00007f4178584ae0 RSI: 00000000200003c0 RDI: 00007f4178584b00 15:23:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xe0}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x27c, 0x0) [ 577.865595][T25020] RBP: 0000000000000001 R08: 00007f4178584b40 R09: 00007f4178584ae0 [ 577.873562][T25020] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 577.881527][T25020] R13: 00000000004c8b25 R14: 00000000004dfbc8 R15: 0000000000000004 15:23:40 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x27d, 0x0) [ 578.000470][T25021] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 578.021761][ C1] net_ratelimit: 10 callbacks suppressed [ 578.021769][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 578.033161][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 578.090787][T25021] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. 15:23:40 executing program 2 (fault-call:2 fault-nth:60): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x1f4}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x27e, 0x0) 15:23:40 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:40 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:40 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) r6 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r6, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) sendmmsg(r6, &(0x7f0000000100), 0x5bd, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) connect$rxrpc(r5, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r5) setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f00000000c0)={0x2, 0x2, 0x12000}, 0x4) close(r4) r7 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r7, 0x110, 0x3) connect$rxrpc(r7, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r7, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r7) r8 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r8, 0x110, 0x3) connect$rxrpc(r8, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r8, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r8) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0xffffffffffffff56) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r9 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r9, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:40 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x300}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:40 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x27f, 0x0) [ 578.644697][T25060] FAULT_INJECTION: forcing a failure. [ 578.644697][T25060] name failslab, interval 1, probability 0, space 0, times 0 [ 578.696829][T25060] CPU: 1 PID: 25060 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 578.704410][T25060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 578.714457][T25060] Call Trace: [ 578.717752][T25060] dump_stack+0xf5/0x159 [ 578.722003][T25060] should_fail.cold+0xa/0x1a [ 578.726594][T25060] __should_failslab+0xee/0x130 [ 578.731458][T25060] should_failslab+0x9/0x14 [ 578.735962][T25060] kmem_cache_alloc+0x29/0x5d0 [ 578.740728][T25060] ? __write_once_size.constprop.0+0x12/0x20 [ 578.746704][T25060] ? __write_once_size.constprop.0+0x12/0x20 [ 578.752861][T25060] ? __tsan_read4+0x15/0x30 [ 578.757359][T25060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 578.763606][T25060] ? __tsan_read1+0x15/0x30 [ 578.768108][T25060] getname_kernel+0x46/0x200 [ 578.772704][T25060] kern_path+0x29/0x60 [ 578.776767][T25060] lookup_bdev.part.0+0x3e/0x130 [ 578.781704][T25060] blkdev_get_by_path+0x70/0x110 [ 578.786636][T25060] btrfs_scan_one_device+0x56/0x3c0 [ 578.791835][T25060] btrfs_mount_root+0x274/0xb00 [ 578.796696][T25060] ? __tsan_read8+0x15/0x30 [ 578.801199][T25060] ? legacy_parse_param+0xec/0x5f0 [ 578.806321][T25060] ? __tsan_read8+0x15/0x30 [ 578.810826][T25060] ? btrfs_decode_error+0x60/0x60 [ 578.815875][T25060] legacy_get_tree+0x7e/0xf0 [ 578.820466][T25060] vfs_get_tree+0x58/0x200 [ 578.824881][T25060] fc_mount+0x20/0x80 [ 578.828860][T25060] vfs_kern_mount.part.0+0xe6/0xf0 [ 578.833967][T25060] vfs_kern_mount+0x49/0x70 [ 578.838471][T25060] btrfs_mount+0x250/0xf41 [ 578.842883][T25060] ? __read_once_size.constprop.0+0x12/0x20 [ 578.848784][T25060] ? __tsan_read4+0x15/0x30 [ 578.853287][T25060] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 578.859524][T25060] ? refcount_sub_and_test_checked+0xc8/0x190 [ 578.865600][T25060] ? refcount_dec_and_test_checked+0x2c/0x40 [ 578.871576][T25060] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 578.877989][T25060] ? apparmor_capable+0x1c3/0x300 [ 578.883012][T25060] ? __tsan_read8+0x15/0x30 [ 578.887514][T25060] ? btrfs_remount+0x930/0x930 [ 578.892313][T25060] legacy_get_tree+0x7e/0xf0 [ 578.896898][T25060] ? legacy_get_tree+0x7e/0xf0 [ 578.901663][T25060] vfs_get_tree+0x58/0x200 [ 578.906075][T25060] do_mount+0x1031/0x1560 [ 578.910404][T25060] ksys_mount+0xe8/0x160 [ 578.914644][T25060] __x64_sys_mount+0x70/0x90 [ 578.919234][T25060] do_syscall_64+0xcf/0x2f0 [ 578.923740][T25060] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 578.929624][T25060] RIP: 0033:0x45c47a [ 578.933514][T25060] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 578.953115][T25060] RSP: 002b:00007f4178584a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 578.961518][T25060] RAX: ffffffffffffffda RBX: 00007f4178584b40 RCX: 000000000045c47a [ 578.969624][T25060] RDX: 00007f4178584ae0 RSI: 00000000200003c0 RDI: 00007f4178584b00 [ 578.977594][T25060] RBP: 0000000000000001 R08: 00007f4178584b40 R09: 00007f4178584ae0 [ 578.985566][T25060] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 15:23:41 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, 0x0) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x3e8}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 578.993619][T25060] R13: 00000000004c8b25 R14: 00000000004dfbc8 R15: 0000000000000004 15:23:41 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x280, 0x0) 15:23:41 executing program 2 (fault-call:2 fault-nth:61): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x500}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x281, 0x0) 15:23:41 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:41 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:41 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) recvfrom$rxrpc(0xffffffffffffffff, &(0x7f00000001c0)=""/205, 0xcd, 0x10000, &(0x7f00000000c0)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x3ff, @ipv4={[], [], @local}, 0x401}}, 0x24) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x600}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:41 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x282, 0x0) [ 579.333797][T25099] FAULT_INJECTION: forcing a failure. [ 579.333797][T25099] name failslab, interval 1, probability 0, space 0, times 0 [ 579.351026][T25099] CPU: 1 PID: 25099 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 579.358590][T25099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 579.368631][T25099] Call Trace: [ 579.371912][T25099] dump_stack+0xf5/0x159 [ 579.376145][T25099] should_fail.cold+0xa/0x1a [ 579.380739][T25099] __should_failslab+0xee/0x130 [ 579.385573][T25099] should_failslab+0x9/0x14 [ 579.390065][T25099] kmem_cache_alloc+0x29/0x5d0 [ 579.394828][T25099] ? __write_once_size.constprop.0+0x12/0x20 [ 579.400810][T25099] ? __write_once_size.constprop.0+0x12/0x20 [ 579.406777][T25099] ? __tsan_read4+0x15/0x30 [ 579.411269][T25099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 579.417491][T25099] ? __tsan_read1+0x15/0x30 [ 579.421980][T25099] getname_kernel+0x46/0x200 [ 579.426554][T25099] kern_path+0x29/0x60 [ 579.430607][T25099] lookup_bdev.part.0+0x3e/0x130 [ 579.435530][T25099] blkdev_get_by_path+0x70/0x110 [ 579.440466][T25099] btrfs_scan_one_device+0x56/0x3c0 [ 579.445654][T25099] btrfs_mount_root+0x274/0xb00 [ 579.450490][T25099] ? apic_timer_interrupt+0xa/0x20 [ 579.455587][T25099] ? legacy_parse_param+0xec/0x5f0 [ 579.460680][T25099] ? __tsan_read8+0x15/0x30 [ 579.465169][T25099] ? btrfs_decode_error+0x60/0x60 [ 579.470178][T25099] legacy_get_tree+0x7e/0xf0 [ 579.474842][T25099] vfs_get_tree+0x58/0x200 [ 579.479239][T25099] fc_mount+0x20/0x80 [ 579.483208][T25099] vfs_kern_mount.part.0+0xe6/0xf0 [ 579.488299][T25099] vfs_kern_mount+0x49/0x70 [ 579.492786][T25099] btrfs_mount+0x250/0xf41 [ 579.497273][T25099] ? __read_once_size.constprop.0+0x12/0x20 [ 579.503321][T25099] ? __tsan_read4+0x15/0x30 [ 579.507818][T25099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 579.514039][T25099] ? refcount_sub_and_test_checked+0xc8/0x190 [ 579.520100][T25099] ? refcount_dec_and_test_checked+0x2c/0x40 [ 579.526061][T25099] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 579.532288][T25099] ? apparmor_capable+0x1c3/0x300 [ 579.537296][T25099] ? apic_timer_interrupt+0xa/0x20 [ 579.542478][T25099] ? btrfs_remount+0x930/0x930 [ 579.547223][T25099] legacy_get_tree+0x7e/0xf0 [ 579.551794][T25099] ? legacy_get_tree+0x7e/0xf0 [ 579.556552][T25099] vfs_get_tree+0x58/0x200 [ 579.561050][T25099] do_mount+0x1031/0x1560 [ 579.565367][T25099] ksys_mount+0xe8/0x160 [ 579.569595][T25099] __x64_sys_mount+0x70/0x90 [ 579.574173][T25099] do_syscall_64+0xcf/0x2f0 [ 579.578670][T25099] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 579.584557][T25099] RIP: 0033:0x45c47a [ 579.588438][T25099] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 9d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 7a 8d fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 579.608545][T25099] RSP: 002b:00007f4178584a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 579.616939][T25099] RAX: ffffffffffffffda RBX: 00007f4178584b40 RCX: 000000000045c47a [ 579.624893][T25099] RDX: 00007f4178584ae0 RSI: 00000000200003c0 RDI: 00007f4178584b00 [ 579.632848][T25099] RBP: 0000000000000001 R08: 00007f4178584b40 R09: 00007f4178584ae0 [ 579.640802][T25099] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000005 [ 579.648768][T25099] R13: 00000000004c8b25 R14: 00000000004dfbc8 R15: 0000000000000004 15:23:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x700}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:42 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x283, 0x0) 15:23:42 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:42 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:42 executing program 2 (fault-call:2 fault-nth:62): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x900}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:42 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x284, 0x0) 15:23:42 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) [ 579.941765][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 579.947676][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 579.953449][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 579.959182][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 579.964935][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 579.970666][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:23:42 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xa00}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 579.997225][T25132] FAULT_INJECTION: forcing a failure. [ 579.997225][T25132] name failslab, interval 1, probability 0, space 0, times 0 [ 580.021768][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 580.027554][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 580.072940][T25132] CPU: 1 PID: 25132 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 580.080529][T25132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.090583][T25132] Call Trace: [ 580.093882][T25132] dump_stack+0xf5/0x159 [ 580.098126][T25132] should_fail.cold+0xa/0x1a [ 580.102717][T25132] __should_failslab+0xee/0x130 [ 580.107589][T25132] should_failslab+0x9/0x14 [ 580.112098][T25132] __kmalloc+0x53/0x690 [ 580.116255][T25132] ? tomoyo_encode2.part.0+0xd9/0x260 [ 580.121632][T25132] tomoyo_encode2.part.0+0xd9/0x260 [ 580.126827][T25132] tomoyo_encode+0x34/0x50 [ 580.131239][T25132] tomoyo_realpath_from_path+0x14a/0x4c0 [ 580.136870][T25132] ? tomoyo_get_mode.part.0+0x5c/0xb0 [ 580.142328][T25132] tomoyo_path_number_perm+0x10a/0x3c0 [ 580.147785][T25132] ? refcount_sub_and_test_checked+0xc8/0x190 [ 580.153851][T25132] ? __tsan_read8+0x15/0x30 [ 580.158353][T25132] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 580.164604][T25132] ? __fget+0xb8/0x1d0 [ 580.168683][T25132] tomoyo_file_ioctl+0x2c/0x40 [ 580.173452][T25132] security_file_ioctl+0x6d/0xa0 [ 580.178390][T25132] ksys_ioctl+0x64/0xe0 [ 580.182542][T25132] __x64_sys_ioctl+0x4c/0x60 [ 580.187230][T25132] do_syscall_64+0xcf/0x2f0 [ 580.191737][T25132] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 580.197630][T25132] RIP: 0033:0x459897 [ 580.201531][T25132] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 580.221134][T25132] RSP: 002b:00007f4178584a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 580.229630][T25132] RAX: ffffffffffffffda RBX: 00007f4178584b40 RCX: 0000000000459897 [ 580.237594][T25132] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 580.245562][T25132] RBP: 0000000000000001 R08: 00007f4178584b40 R09: 00007f4178584ae0 [ 580.253518][T25132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 580.261487][T25132] R13: 00000000004c8b25 R14: 00000000004dfbc8 R15: 0000000000000004 [ 580.341785][T25132] ERROR: Out of memory at tomoyo_realpath_from_path. 15:23:43 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=[@decrefs], 0x0, 0x0, 0x0}) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r4, 0xc0406618, &(0x7f00000000c0)={{0x0, 0x0, @descriptor="c84ba8fd68628654"}}) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) connect$rxrpc(r5, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="66947a521bae8da31001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r5) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:43 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xe00}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:43 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x285, 0x0) 15:23:43 executing program 2 (fault-call:2 fault-nth:63): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:43 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(0xffffffffffffffff, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:43 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x1600}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x286, 0x0) 15:23:43 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) [ 580.862021][T25152] FAULT_INJECTION: forcing a failure. [ 580.862021][T25152] name failslab, interval 1, probability 0, space 0, times 0 [ 580.891829][T25152] CPU: 0 PID: 25152 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 580.899592][T25152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 580.909658][T25152] Call Trace: [ 580.912956][T25152] dump_stack+0xf5/0x159 [ 580.917211][T25152] should_fail.cold+0xa/0x1a [ 580.921983][T25152] ? dev_uevent_filter+0x80/0x80 [ 580.926919][T25152] __should_failslab+0xee/0x130 [ 580.931768][T25152] should_failslab+0x9/0x14 [ 580.936271][T25152] kmem_cache_alloc_trace+0x2a/0x5d0 [ 580.941567][T25152] ? radix_tree_delete_item+0xce/0x1c0 [ 580.947031][T25152] ? dev_uevent_filter+0x80/0x80 [ 580.951968][T25152] kobject_uevent_env+0x182/0xc00 [ 580.956990][T25152] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 580.963230][T25152] ? kernfs_put+0x279/0x380 [ 580.967841][T25152] ? up_write+0x5f/0x90 [ 580.971995][T25152] kobject_uevent+0x29/0x40 [ 580.976493][T25152] __loop_clr_fd+0x322/0x720 [ 580.981086][T25152] lo_ioctl+0x24c/0xc80 [ 580.985239][T25152] ? loop_set_fd+0x8f0/0x8f0 [ 580.989828][T25152] blkdev_ioctl+0x979/0x1160 [ 580.994426][T25152] block_ioctl+0x95/0xc0 [ 580.998670][T25152] ? blkdev_fallocate+0x2f0/0x2f0 [ 581.003691][T25152] do_vfs_ioctl+0x991/0xc60 [ 581.008192][T25152] ? tomoyo_file_ioctl+0x34/0x40 [ 581.013126][T25152] ? __tsan_read8+0x15/0x30 [ 581.017638][T25152] ksys_ioctl+0xbd/0xe0 [ 581.021800][T25152] __x64_sys_ioctl+0x4c/0x60 [ 581.026393][T25152] do_syscall_64+0xcf/0x2f0 [ 581.030898][T25152] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 581.036790][T25152] RIP: 0033:0x459897 [ 581.040688][T25152] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 15:23:43 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(0xffffffffffffffff, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) [ 581.060298][T25152] RSP: 002b:00007f4178584a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 581.068808][T25152] RAX: ffffffffffffffda RBX: 00007f4178584b40 RCX: 0000000000459897 [ 581.076776][T25152] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 581.084741][T25152] RBP: 0000000000000001 R08: 00007f4178584b40 R09: 00007f4178584ae0 [ 581.092734][T25152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 581.100701][T25152] R13: 00000000004c8b25 R14: 00000000004dfbc8 R15: 0000000000000004 15:23:43 executing program 2 (fault-call:2 fault-nth:64): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:43 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x287, 0x0) [ 581.302065][T25179] FAULT_INJECTION: forcing a failure. [ 581.302065][T25179] name failslab, interval 1, probability 0, space 0, times 0 [ 581.320300][T25179] CPU: 1 PID: 25179 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 581.327852][T25179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.337902][T25179] Call Trace: [ 581.341197][T25179] dump_stack+0xf5/0x159 [ 581.345441][T25179] should_fail.cold+0xa/0x1a [ 581.350033][T25179] ? dev_uevent_filter+0x80/0x80 [ 581.354972][T25179] __should_failslab+0xee/0x130 [ 581.359821][T25179] should_failslab+0x9/0x14 [ 581.364337][T25179] kmem_cache_alloc_trace+0x2a/0x5d0 [ 581.370153][T25179] ? radix_tree_delete_item+0xce/0x1c0 [ 581.375611][T25179] ? dev_uevent_filter+0x80/0x80 [ 581.380545][T25179] kobject_uevent_env+0x182/0xc00 [ 581.385566][T25179] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 581.391803][T25179] ? kernfs_put+0x279/0x380 [ 581.396307][T25179] ? up_write+0x5f/0x90 [ 581.400460][T25179] kobject_uevent+0x29/0x40 [ 581.404963][T25179] __loop_clr_fd+0x322/0x720 [ 581.409551][T25179] lo_ioctl+0x24c/0xc80 [ 581.413711][T25179] ? loop_set_fd+0x8f0/0x8f0 [ 581.418302][T25179] blkdev_ioctl+0x979/0x1160 [ 581.422888][T25179] ? do_vfs_ioctl+0x55/0xc60 [ 581.427477][T25179] block_ioctl+0x95/0xc0 [ 581.431716][T25179] ? blkdev_fallocate+0x2f0/0x2f0 [ 581.436741][T25179] do_vfs_ioctl+0x991/0xc60 [ 581.441248][T25179] ? tomoyo_file_ioctl+0x34/0x40 [ 581.446176][T25179] ? __tsan_read8+0x15/0x30 [ 581.450683][T25179] ksys_ioctl+0xbd/0xe0 [ 581.454837][T25179] __x64_sys_ioctl+0x4c/0x60 [ 581.459425][T25179] do_syscall_64+0xcf/0x2f0 [ 581.463929][T25179] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 581.469816][T25179] RIP: 0033:0x459897 [ 581.473710][T25179] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 581.493392][T25179] RSP: 002b:00007f4178584a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 581.501798][T25179] RAX: ffffffffffffffda RBX: 00007f4178584b40 RCX: 0000000000459897 [ 581.509761][T25179] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 581.517725][T25179] RBP: 0000000000000001 R08: 00007f4178584b40 R09: 00007f4178584ae0 [ 581.525692][T25179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 581.533660][T25179] R13: 00000000004c8b25 R14: 00000000004dfbc8 R15: 0000000000000004 15:23:44 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r3, 0x110, 0x3) connect$rxrpc(r3, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r4 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x2800c1, 0x0) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f00000016c0)={0x3, @win={{0x98d, 0x6, 0x80000001, 0x1}, 0x2, 0x7, &(0x7f00000015c0)={{0x5, 0xfffffffd, 0x3a8173a6, 0x299}, &(0x7f0000001580)={{0xffffffff, 0x7f, 0x822, 0xfffff641}, &(0x7f0000001540)={{0x5, 0x8, 0x7fff00, 0x2e3}}}}, 0x7f, &(0x7f0000001600)="c24bf6853fa967b63aa80969cf936e3223c2b0f200fc110b823ff3f2b16fd950e811fdeb435436a93fa6e95d9acf090fdc7ffb03cb4a7537033eaddf1bd9008efddd853bc6b17bb8d42141ac1897a1640adf673002db9916a338d4510f2bda90b91d3e002247d83c175ee7c28069adac6c3d18b8bc6faaea713fcbd72042ee3948d694052eb7b9a2beb8a5afbe9d875b97a0170a2ebfefba713ef395025b1d6c6c9e89d4aeee3d91f37e6c", 0x8}}) write$evdev(r4, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f00000001c0)='./file0\x00', 0x5, 0x3, &(0x7f00000014c0)=[{&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000000200), 0x0, 0x9}, {&(0x7f0000000240)="41592bb2681df57700927b438491a8829c7130779ca744efdbf800c935cbb0c3e8a14e5a21ceb234930b31419392c011ef75cf4110c6e70876695dc747c543e985840269aa0f156088b3a941fd25b316d2ffdbca57f3fd904165e62aebf93353ce9ddb852380f70279f411c86c3b5922", 0x70, 0x8e2}], 0x10, 0x0) write$binfmt_script(r1, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x4800}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:44 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:44 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x288, 0x0) 15:23:44 executing program 2 (fault-call:2 fault-nth:65): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:44 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(0xffffffffffffffff, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) [ 581.948513][T25192] __ntfs_warning: 46 callbacks suppressed [ 581.948529][T25192] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 15:23:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x4c00}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:44 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x289, 0x0) [ 582.040994][T25192] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 582.055491][T25192] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 582.069028][T25196] FAULT_INJECTION: forcing a failure. [ 582.069028][T25196] name failslab, interval 1, probability 0, space 0, times 0 [ 582.090651][T25196] CPU: 0 PID: 25196 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 582.098233][T25196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.108376][T25196] Call Trace: [ 582.111657][T25196] dump_stack+0xf5/0x159 [ 582.115888][T25196] should_fail.cold+0xa/0x1a [ 582.120467][T25196] __should_failslab+0xee/0x130 [ 582.125300][T25196] should_failslab+0x9/0x14 [ 582.129787][T25196] kmem_cache_alloc_node_trace+0x3b/0x670 [ 582.135489][T25196] ? __tsan_read8+0x15/0x30 [ 582.139972][T25196] ? __tsan_read8+0x15/0x30 [ 582.144460][T25196] ? memcg_kmem_put_cache+0x91/0xe0 [ 582.149645][T25196] __kmalloc_node_track_caller+0x38/0x50 [ 582.155261][T25196] __kmalloc_reserve.isra.0+0x49/0xd0 [ 582.160614][T25196] __alloc_skb+0xc2/0x350 [ 582.164933][T25196] alloc_uevent_skb+0x74/0x140 [ 582.169680][T25196] kobject_uevent_env+0x6ed/0xc00 [ 582.174689][T25196] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 582.180910][T25196] ? kernfs_put+0x279/0x380 [ 582.185401][T25196] kobject_uevent+0x29/0x40 [ 582.189889][T25196] __loop_clr_fd+0x322/0x720 [ 582.194473][T25196] lo_ioctl+0x24c/0xc80 [ 582.198616][T25196] ? loop_set_fd+0x8f0/0x8f0 [ 582.203201][T25196] blkdev_ioctl+0x979/0x1160 [ 582.207775][T25196] ? blkdev_fallocate+0x2f0/0x2f0 [ 582.212786][T25196] block_ioctl+0x95/0xc0 [ 582.217010][T25196] ? blkdev_fallocate+0x2f0/0x2f0 [ 582.222015][T25196] do_vfs_ioctl+0x991/0xc60 [ 582.226502][T25196] ? tomoyo_file_ioctl+0x34/0x40 [ 582.231418][T25196] ? __tsan_read8+0x15/0x30 [ 582.235910][T25196] ksys_ioctl+0xbd/0xe0 [ 582.240061][T25196] __x64_sys_ioctl+0x4c/0x60 [ 582.244636][T25196] do_syscall_64+0xcf/0x2f0 [ 582.249127][T25196] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 582.254999][T25196] RIP: 0033:0x459897 [ 582.258879][T25196] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 582.278463][T25196] RSP: 002b:00007f4178584a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 582.286864][T25196] RAX: ffffffffffffffda RBX: 00007f4178584b40 RCX: 0000000000459897 [ 582.294821][T25196] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 582.302772][T25196] RBP: 0000000000000001 R08: 00007f4178584b40 R09: 00007f4178584ae0 [ 582.310727][T25196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 582.318681][T25196] R13: 00000000004c8b25 R14: 00000000004dfbc8 R15: 0000000000000004 [ 582.337197][T25192] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 15:23:44 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x6000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:44 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x28a, 0x0) 15:23:44 executing program 2 (fault-call:2 fault-nth:66): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) [ 582.578559][T25192] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 582.586940][T25204] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 582.620794][T25192] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 582.645336][T25192] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 582.674857][T25192] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 15:23:45 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) [ 582.813388][T25218] FAULT_INJECTION: forcing a failure. [ 582.813388][T25218] name failslab, interval 1, probability 0, space 0, times 0 [ 582.841827][T25218] CPU: 0 PID: 25218 Comm: syz-executor.2 Not tainted 5.3.0+ #0 [ 582.849421][T25218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 582.859728][T25218] Call Trace: [ 582.863020][T25218] dump_stack+0xf5/0x159 [ 582.867272][T25218] should_fail.cold+0xa/0x1a [ 582.871862][T25218] __should_failslab+0xee/0x130 [ 582.876710][T25218] should_failslab+0x9/0x14 [ 582.881215][T25218] kmem_cache_alloc+0x29/0x5d0 [ 582.885974][T25218] ? apic_timer_interrupt+0xa/0x20 [ 582.891088][T25218] skb_clone+0xf9/0x280 [ 582.895245][T25218] netlink_broadcast_filtered+0x61f/0x800 [ 582.900970][T25218] netlink_broadcast+0x43/0x60 [ 582.905733][T25218] kobject_uevent_env+0x6b6/0xc00 [ 582.910755][T25218] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 582.916992][T25218] ? kernfs_put+0x279/0x380 [ 582.921503][T25218] kobject_uevent+0x29/0x40 [ 582.926023][T25218] __loop_clr_fd+0x322/0x720 [ 582.930618][T25218] lo_ioctl+0x24c/0xc80 [ 582.934780][T25218] ? loop_set_fd+0x8f0/0x8f0 [ 582.939368][T25218] blkdev_ioctl+0x979/0x1160 [ 582.943960][T25218] block_ioctl+0x95/0xc0 [ 582.948198][T25218] ? blkdev_fallocate+0x2f0/0x2f0 [ 582.953222][T25218] do_vfs_ioctl+0x991/0xc60 [ 582.957734][T25218] ? tomoyo_file_ioctl+0x34/0x40 [ 582.962670][T25218] ? __tsan_read8+0x15/0x30 [ 582.967175][T25218] ksys_ioctl+0xbd/0xe0 [ 582.971330][T25218] __x64_sys_ioctl+0x4c/0x60 [ 582.975918][T25218] do_syscall_64+0xcf/0x2f0 [ 582.980424][T25218] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 582.986309][T25218] RIP: 0033:0x459897 [ 582.990202][T25218] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d b9 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 583.009815][T25218] RSP: 002b:00007f4178584a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 583.018223][T25218] RAX: ffffffffffffffda RBX: 00007f4178584b40 RCX: 0000000000459897 [ 583.026192][T25218] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000006 [ 583.034160][T25218] RBP: 0000000000000001 R08: 00007f4178584b40 R09: 00007f4178584ae0 [ 583.042125][T25218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 583.050088][T25218] R13: 00000000004c8b25 R14: 00000000004dfbc8 R15: 0000000000000004 [ 583.163239][T25228] VFS: Can't find a Minix filesystem V1 | V2 | V3 on device loop5. [ 583.381776][ C1] net_ratelimit: 14 callbacks suppressed [ 583.381785][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 583.393205][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:23:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(0xffffffffffffffff, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r4 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r4, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x6300}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:46 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x28b, 0x0) 15:23:46 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:46 executing program 2 (fault-call:2 fault-nth:67): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:46 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) [ 583.914124][T25235] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 15:23:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x6800}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:46 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x28c, 0x0) [ 583.970508][T25235] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. 15:23:46 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x6c00}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:46 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:46 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) [ 584.101758][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 584.107530][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 584.113257][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 584.118961][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 584.124764][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 584.130467][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 584.181761][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 584.187559][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:23:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r4, 0x40405515, &(0x7f00000001c0)={0xa, 0x2, 0x7, 0x1265b476, '\x00', 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) connect$rxrpc(r5, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r5) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:47 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x28d, 0x0) 15:23:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x7400}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:47 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:47 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='.trfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x7a00}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:47 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x28e, 0x0) 15:23:47 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) [ 585.026601][T25293] Unknown ioctl 1077957909 15:23:47 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:47 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xe000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:47 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x28f, 0x0) 15:23:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000000800000066f9ffff8100000093a1b00f0100000003000000090000000005000000710000000100000000000000"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000003540)=[{{&(0x7f00000004c0)=@rxrpc=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e20, 0xa99, @loopback, 0x9}}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000540)="82b643f987323e0cb4aee1a96c301919bf5fa2419d9624585019bcf0e68c71ba7dd024fb23291c560fbf320531196eab221b8862f84014fbbb942d8e8aef036b99afaa76a151ef9919c04516f6c0b542ceb475e51879c75585d8a498f9e5de33b73a83005014a64e902f2412fcad3aa36f4d8c92a4526448c2c94266f45e2fa0ba689da4a1e6eca84fbc963a08fbcb410451e719775c8aea46e6dd9c1c29177b10c78084f6f908dce36287eda2d905d2d508864573ff2c54086068378fce95cf032432ecdb3bfa8d684f0eb117ae9dbe81e075246f51a8f1603c52903c43c46c84", 0xe1}, {&(0x7f0000000640)="3dc205044856473e22f6c184dd06fe36721162cf080d662685b84f551287524efe31c5a3f8998ba95faadc3b9abee3887a4770ff08e228d974cf8c9f9768eefe132469c65e31208f1c607a050b408e82dfe62a12ede52949a0ea033eec02fd2900de41", 0x63}, {&(0x7f00000006c0)="1a528962896b4c653ce722ee273a6cecab544af580984bfbd4498efe7268582f5a6f53eefef35c510908233548d3fb85ef71a4ad013b84cfdc8e84cf28c4656dddabc196506865555f73423400cd735c21d54e797d24f32ebf1bb59a6a684098823e24e89a4b3e551456100e447d6b581d8248a6b507f7e92cc5fd0014b1e715f130277ccf8204b1aacdef6998f6d6a2341ea0e65c8046c067ea07350174860573", 0xa1}, {&(0x7f0000000780)="d1da829efadf10630ae01905d31747e0a1da5f6463a8981dd428717d7b0a1fa8ba830e45bd42699bcd01f814c97fdb15cc34e495f5ff1bb4bb33bd459254395cfca57ab238497c324ee887a19ee6bb6c6dfc85075a76d6a5ebd30b3e08e0cda6d17deb16d916996a9e9833c9cf670a2c430b228f5ec41961fbdce94d961784630f40f8ee3c72e0b356c382141f40fcc4a97bc3814d2c323f", 0x98}, {&(0x7f0000000840)="2d8b218a135924570c32d5cf98cbe45892fb689ac401ea180fcc01c431cd1a8db873189604bb4bd86813d7957df0ef41e4307c23031c5286c155656bb75dd5ad8f6b1a2f83492554837bd1186249d67a2a7be68e571c8aeaa2554cb4dc12e8b36cdc3c196c2760d12dd9df469120485a64a190189e13e1a10323f0d9183fee43a0f376f04cb376e2e6aad7a7c471dc89dab4", 0x92}], 0x5, &(0x7f0000000980)=[{0x1010, 0x11, 0x8001, "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"}, {0x1010, 0x14, 0x94a, "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"}, {0xb8, 0x1dc, 0x2, "a73e354a31466bc9111f2f50f8924d847e991eebe082c59096a30961884f12e96f1b6d4a8a7cfd1544eb5fe716178b5642486ce38accda01726ea8de20f3808dc16718531b8c2a0a13cf075443bc89efbac7baf0fbd5c543d5ad0f1c76c4213a9364173a47a4bdb02bd82fc6a0f37707894e729288c20a27ada5d382ab6aa5616591295777641e459c1acd040d132e9fc729e7682267b9e75a2b4494672604075080504ca023"}, {0x80, 0x116, 0x7, "c094ee65c98c2806e8b060b4efbd1a7d1fe62165a978511c0d968a969d5aeac6ce59a3b6b3392d3b1ffeeaec8bb71e64121394b93d36744dc4a2a888ef8ffff356171dbf4bf1521adee3b6a714d0d748dd16e8f941d5714e089b0ebb34c2973627c4c01625156b17105439bc7bba90"}, {0x108, 0x1, 0x4, "eed86a0c58273fb5f96b8bf2960fed9fa04572da16bd6b23be78e70dc68acd6152ec427a0a922f243ce11409fe5a4d6ccee72b292758bb24ed4665ed585d7feabe65154aadd3ddd3f89b4237119e136ce56adef9aec7897fdb6fe8bf7773a5b37d1b5d3fbf348ad3f5ecc989b2c3c9d3de73fa1669acd91bb364546966b2bfd6b3ca51c27c8d2cf7b31477fc33263845ea49d27962f3bb8c7c8947c86114870d5e1fcef8392d8ea8bdde1ab1b199bf63fb7d674fb293bc49f779ba15cb6139fbf31603bad1fb6089f1dfb69c4223384b51f2a6ad013e8d41b5b4245501b368c475c95f700e39f4a54abdcac4a50f237460"}, {0xe0, 0x15, 0x7, "5d57b7608f87555cba39e3d746489285eef04cb91893a9e0150412b44e5cbd7776e552ec40c0f32673804340b5600e9125009b282b13b1396d5a86125a75c76c6c9b1fe0be76acd65543d927e8b2e9f322f420ee645c9743f9414225be3426e2ffcccd80f584050ad2ecbef9b59979e5135b5c3c50bf4df5f2eb480856b4bdd698db33b6b69f5867a1d6a45f2a2ea9876ce5d04016e3b621910eee5c1cb9e3511175b1e9c5f0697d09ff0e110ad288c12ce0e0cb399d9a931fd115567ecff635d930008a677e515be6305f9b22cfb3"}], 0x2340}}, {{&(0x7f0000003600)=@in={0x2, 0x4e1d, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, &(0x7f0000003080)=[{&(0x7f0000002d40)="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", 0xfe}, {&(0x7f0000002e40)="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", 0xb9}, {&(0x7f0000002f40)="aff7aa5bfb6e406fa62eb0d87ddfee516ff39553f39d9460d8929a797dfc89bd82b6688731f5d9042cbe8dde38062c0f5f320d12b05619c3e1c545646e162828ac1f9df39b0dc96375bdee5eef5097cee039462a2122d1e744dfad85c7f9d02a099767f5216039dea887014fe676cb606954ec4205216d13c56843c0904698889e3d16a3643374ba1d970f591bf2ccc03ace919607994469fd8e47f063e415aebfbb0714a1c5383bee97", 0xaa}, {&(0x7f0000003000)="c02391a1afdce4fdc097a3148d36d1198a3d640e1f54", 0x16}, {&(0x7f0000003040)="1e5ffb13bb2aa1058ee1bb7f587c5dcae69207eb", 0x14}], 0x5, &(0x7f0000003240)=ANY=[@ANYBLOB="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"], 0x138}}, {{&(0x7f0000003100)=@in={0x2, 0x4e21, @remote}, 0x80, &(0x7f0000003500)=[{&(0x7f0000003680)="054dfd406e5361f1fe41f7bac78d02906b3a6f95fb5959eb6981be4a63b93b62fdc2d868fcff5337599420debafd7c6d0064e5040416f427624be8d4dca996a33b44420f0526b34c3611c516340e0ba3f80d06b2b9d2a88a31f58a7256cd72c85e80195fd1d83c92afb76086a26efcb6382bdc58da69740169794d325e40b1457c0811c810f1adadf5b0bc8e95d54938d8956a96e39511081a29ef6fe997e0bc40e00afc09743b45c5750fe6a35fa6fa", 0xaa}, {&(0x7f0000003440)="8dc49af3c70cf3bbbe0619724b0f379d9246d950cf006c716d9166f48bf67ceb9ae8bba93868f86e289ec6d93f3030728977ec4493fdc4dfeee6aa1b5112c98c9495a6b555b1e1d13e919fd9d3e20f83319877c619f4ac22e1800f40ac9b94b5e4b628ca9cdd0d1ee9aee89e5e3efe368f5c5bf101d19c5e8c29fd4571d5c933a5b390ecab5b753876ce78b02811e355f6ce7df7726bc5818e137e76", 0x9c}, {&(0x7f0000003180)}], 0x3, 0x0, 0x116}}], 0x3, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$EVIOCGMASK(r8, 0x80104592, &(0x7f00000000c0)={0x1, 0xf6, &(0x7f00000001c0)="96d66a179ab9e9cf41dfe2a19de60110fbe58624fbd79a68e1cb8c3cab4cd64bd2d2ea0e33ffc0e3082d20d4a9e6f8a102aa81cbbbf518142899ce8523e5342cacf5bf4d92b15401e05f8f02f12ad55f1cab14685ba1f238c59af6d69e9219e0ca0c653f14708258b2296d349c220dde55529c6088cb7134c3454dd68b184b758f75bafb5a03dc012413243eb78d1585930c90c8f0ec01ed35ae869a038e5cfc4939e40fefceaee2883e8774e2c5b0cc94a4379cf65b8d15161a4babac2648db15bc7dd009beaa18db875da962abc2c6a1746ea3f9220233b93335ef1b9d9b3b551b2ff331b62257a8fb371b933974c3bd3db02b5fe7"}) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='/trfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xe803}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:48 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:48 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x290, 0x0) 15:23:48 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xf401}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:48 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x291, 0x0) 15:23:48 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x292, 0x0) 15:23:48 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r2, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r4}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r3) sendfile(0xffffffffffffffff, r3, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:48 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xff00}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:48 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r3, 0x110, 0x3) connect$rxrpc(r3, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r4 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r4, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) sendmmsg(r5, &(0x7f0000000100), 0x5bd, 0x0) getsockopt(r5, 0x1, 0x80000000, &(0x7f00000001c0)=""/228, &(0x7f00000000c0)=0xe4) personality(0x4040009) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:48 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='\\trfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:48 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x293, 0x0) 15:23:48 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r2, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r4}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r3) sendfile(0xffffffffffffffff, r3, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:48 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x40000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:49 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:49 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x294, 0x0) 15:23:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x1000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:49 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:49 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, 0x0) r2 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r2, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r4}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r3) sendfile(0xffffffffffffffff, r3, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:49 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x2000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='b%rfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) [ 586.966269][T25385] __ntfs_warning: 42 callbacks suppressed [ 586.966283][T25385] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 586.993668][T25385] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 587.022140][T25385] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 587.041788][T25385] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 587.179857][T25385] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 587.231974][T25385] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 587.241210][T25385] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 587.281755][T25385] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 15:23:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x3000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:50 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x295, 0x0) 15:23:50 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(0x0, 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='b\\rfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:50 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xff000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:50 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) sendmmsg(r4, &(0x7f0000000100), 0x5bd, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getpeername(r4, &(0x7f00000001c0)=@isdn, &(0x7f00000000c0)=0x80) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) connect$rxrpc(r5, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) r6 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r6, 0x110, 0x3) connect$rxrpc(r6, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r6, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r6) setsockopt$TIPC_DEST_DROPPABLE(r6, 0x10f, 0x81, &(0x7f0000000280)=0x40, 0x4) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r5) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000240)=0xe8) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r7 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r7, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x4000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 588.278585][T25404] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 15:23:50 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x296, 0x0) [ 588.337535][T25404] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. 15:23:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x5000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:50 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(0x0, 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:50 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x297, 0x0) 15:23:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='bt\\fs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:50 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:50 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x6000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 588.581773][ C1] net_ratelimit: 14 callbacks suppressed [ 588.581781][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 588.593204][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:23:50 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x298, 0x0) 15:23:51 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(0x0, 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x7000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:51 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/407], 0x18}}], 0x1, 0x4048000) close(r4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r7, 0xc034564b, &(0x7f00000000c0)={0x8001, 0x32314142, 0xa33, 0x3ff, 0x1, @stepwise={{0x6968a53, 0xb3c}, {0x40}, {0x7, 0x6}}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r8 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r8, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:51 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x299, 0x0) 15:23:51 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btr%s\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x8000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:51 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x0, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x9000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:51 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x29a, 0x0) 15:23:51 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x0, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:51 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:51 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xa000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btr.s\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) [ 589.621834][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 589.627790][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:23:52 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1", 0x80}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:52 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x29b, 0x0) 15:23:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xe000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:52 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x0, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:52 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btr/s\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x16000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:52 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x29c, 0x0) 15:23:52 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) [ 590.341768][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 590.347567][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 590.353332][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 590.359062][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 590.364824][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 590.370542][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:23:52 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x48000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:52 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:52 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x29d, 0x0) 15:23:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x4c000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btr\\s\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:53 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x29e, 0x0) 15:23:53 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:53 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x60000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:53 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) r6 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0xc8, 0x81000) r7 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r7, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x7a, &(0x7f0000000100)={r8}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0x7f, 0x80, 0x0, 0x10001, 0x200, 0x5c, 0x8, 0x8, r8}, &(0x7f0000000540)=0x20) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r4, 0x84, 0x78, &(0x7f00000000c0)=r8, 0x4) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:53 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x29f, 0x0) 15:23:53 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:53 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x63000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrf#\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:53 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2a0, 0x0) 15:23:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x68000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:53 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2a1, 0x0) 15:23:53 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(0x0, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:53 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x6c000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:54 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) r6 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r6, 0x110, 0x3) connect$rxrpc(r6, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r6, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r6) r7 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r7, 0x110, 0x3) connect$rxrpc(r7, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r7, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r7) setsockopt$packet_int(r7, 0x107, 0xb, &(0x7f0000000180), 0xffffffe1) 15:23:54 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2a2, 0x0) 15:23:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x74000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrf%\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:54 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(0x0, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:54 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x7a000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:54 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2a3, 0x0) [ 592.179575][T25623] __ntfs_warning: 70 callbacks suppressed [ 592.179592][T25623] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 15:23:54 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(0x0, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) [ 592.232003][T25623] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 592.247674][T25623] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 15:23:54 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x97ffffff}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:54 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2a4, 0x0) [ 592.291815][T25623] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 15:23:54 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrf*\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) [ 592.410323][T25623] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 592.462321][T25623] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 592.481777][T25623] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 592.528702][T25623] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 15:23:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:55 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:55 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2a5, 0x0) 15:23:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xe0000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:55 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrf+\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xe8030000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 593.034617][T25665] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 15:23:55 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2a6, 0x0) 15:23:55 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) sendmmsg(r4, &(0x7f0000000100), 0x5bd, 0x0) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) connect$rxrpc(r5, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r5) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000280)=@assoc_value={r6, 0x9}, &(0x7f00000004c0)=0x8) accept$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r7 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r7, 0x110, 0x3) connect$rxrpc(r7, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r7, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1842000000000000100100"/24], 0x18}}], 0x1, 0x4048000) close(r7) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r8 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r8, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) [ 593.130001][T25665] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. 15:23:55 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xf4010000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:55 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2a7, 0x0) 15:23:55 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrf-\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xff000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:55 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:55 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2a8, 0x0) 15:23:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xffff0000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:55 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:55 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2a9, 0x0) 15:23:55 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xffffff7f}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 593.781770][ C1] net_ratelimit: 14 callbacks suppressed [ 593.781779][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 593.793288][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:23:56 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) ioctl$KVM_GET_FPU(r3, 0x81a0ae8c, &(0x7f00000004c0)) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) r6 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=[@decrefs], 0x0, 0x0, 0x0}) r7 = dup3(0xffffffffffffffff, r6, 0x0) syz_open_pts(r7, 0x0) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xffffff97}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:56 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:56 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2aa, 0x0) 15:23:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrf.\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:56 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:56 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2ab, 0x0) 15:23:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x4000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:56 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:56 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x100000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:56 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:56 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2ac, 0x0) [ 594.501773][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 594.507565][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 594.514635][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 594.520348][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 594.526105][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 594.531846][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 594.591775][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 594.597570][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:23:57 executing program 5: setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x0, 0x7, {0x2}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r3, 0x110, 0x3) connect$rxrpc(r3, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r3, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r4 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r4, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrf/\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:57 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x200000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2ad, 0x0) 15:23:57 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x300000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2ae, 0x0) 15:23:57 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) sendmmsg(r4, &(0x7f0000000100), 0x5bd, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f00000000c0)=0x7, 0x4) prctl$PR_MCE_KILL_GET(0x22) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) connect$rxrpc(r5, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r5) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:57 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:57 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrf0\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x400000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2af, 0x0) 15:23:57 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2b0, 0x0) 15:23:57 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x500000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:57 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2b1, 0x0) 15:23:57 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x600000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:58 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) 15:23:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfX\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2b2, 0x0) 15:23:58 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:58 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x700000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x800000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2b3, 0x0) 15:23:58 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:58 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x900000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:58 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:58 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2b4, 0x0) 15:23:59 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f010009420000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:23:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrf\\\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:23:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xa00000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:59 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2b5, 0x0) 15:23:59 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:23:59 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:59 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2b6, 0x0) 15:23:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xe00000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:59 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2b7, 0x0) 15:23:59 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:23:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x1600000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:23:59 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) [ 597.380079][T25920] __ntfs_warning: 74 callbacks suppressed [ 597.380094][T25920] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 597.432013][T25920] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 597.446056][T25920] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 597.474225][T25920] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 597.541538][T25920] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 597.583084][T25920] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 597.602767][T25920] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 597.631792][T25920] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 15:24:00 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3, 0x1002}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b0000000800060000000000000001004847d9ebc0c733844f23e6eb9822dd130000002f808fcf61bdc20c9db23ff9ffff8100000093a1910f01000000030000000900006b5f3ef00000800000000000000000000000000040"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000035, 0x2, 0x10000000000002) umount2(&(0x7f00000000c0)='./file0\x00', 0x1) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r5, 0x4, 0x2000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x1) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) pkey_alloc(0x0, 0x2) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2b8, 0x0) 15:24:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfc\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x4800000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:00 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:00 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x4c00000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 597.996400][T25931] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 15:24:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2b9, 0x0) [ 598.093266][T25931] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. 15:24:00 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:00 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x6000000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:00 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2ba, 0x0) 15:24:00 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0xfffffffffffffed5) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfd\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x6300000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:01 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2bb, 0x0) 15:24:01 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:01 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x6800000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:01 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2bc, 0x0) [ 598.981780][ C1] net_ratelimit: 10 callbacks suppressed [ 598.981789][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 598.993211][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_G_FBUF(r8, 0x8030560a, &(0x7f00000000c0)={0x0, 0xebac15d2a93ddc72, &(0x7f00000001c0)="5dc70f509cff849b288f36e8b54493eaf650f0ba0a8886f9e4507bf362792ba8c98af779e25e83e0802ff9bc9ce49a32e3bff553ca33caf4db7d9b262e99c8b2b1135787a71f2405bbb83d20d2ffec1f1d9fda5a8f34dab25568938c1b4ca2da11ba259bfe0c4679801f24c9acc61499837714ca1685427a3b9ba812506c213882bb8e96ef99eb6ff3bfabc4f099f1d446dd76f597eee202f73a0cef3b81fc59c24d30bdce7e7d7cd79f7a848a", {0x0, 0x7fffffff, 0x5b3233f4, 0x8, 0x9, 0x82c4, 0xd, 0x9}}) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:01 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:01 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2bd, 0x0) 15:24:01 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfi\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x6c00000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:01 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2be, 0x0) 15:24:01 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:01 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x7400000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:01 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2bf, 0x0) 15:24:01 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x7a00000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4ba10000080000000500000001040000480000001f20000000000001010010008100000001f500808f070000088e0000009300000000800000000000000500000071ef8d1cfb00"/84]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfl\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:02 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:02 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:02 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2c0, 0x0) 15:24:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0x97ffffff00000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xe000000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:02 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2c1, 0x0) 15:24:02 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:02 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:02 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xe803000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:02 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2c2, 0x0) 15:24:03 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000e80)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000570000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xffffffffffffffd1) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000540)={{0x4e60baea6417e434, 0x40, 0x8, 0xd, 0x39f, 0x9, 0x3b2, 0x81}, "ed0700ce725941b6b8e00adcbbe09dd10abf720365b405fd223bd68bd672d8cc94f6d0ee41b129ee430f8b2d938baea4a20ed40e1a85d8f4799ff8469fca77db350d4d05352828168be9da26f1f68c9c54ef31dbdbdd46529374d3de4a54b5176fd17283d5da2de162e4aa5481a692a70b215883e015736cf03748dd63f417cf6205cb78ceeacb9a71b17684bbc7658d39090d2f40294f02a73991a76ed35dd96788ed7dd4ccfbcd1b6b5f77c6f5cadb4a035cadea62791085412ce8e40033c20c5e7385ccfbe3c8d79fe3edbf176b7fd6815fd397bd15a28c0015b78b98c4b01e5a69119fe567713db7f6", [[], [], [], [], [], [], [], []]}, 0x90b) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) r6 = gettid() tkill(r6, 0x16) get_robust_list(r6, &(0x7f00000004c0)=&(0x7f0000000380)={&(0x7f0000000200)={&(0x7f00000001c0)}, 0x0, &(0x7f0000000280)={&(0x7f0000000240)}}, &(0x7f0000000500)=0x18) 15:24:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xf401000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfo\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:03 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2c3, 0x0) 15:24:03 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:03 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:03 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2c4, 0x0) 15:24:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xff00000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 601.061763][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 601.067562][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:03 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xff00000000000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:03 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:03 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xffff000000000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:03 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2c5, 0x0) 15:24:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) execveat(r3, &(0x7f00000000c0)='./file0\x00', &(0x7f00000004c0)=[&(0x7f00000001c0)='vboxnet1$\x00', &(0x7f0000000200)='/dev/input/event#\x00', &(0x7f0000000240)='systemvmnet1]/system/]((\x00', &(0x7f0000000280)='/dev/input/event#\x00'], &(0x7f0000000700)=[&(0x7f0000000500)=':mime_type.,\x00', &(0x7f0000000540)='/dev/input/event#\x00', &(0x7f0000000580)='\x00', &(0x7f00000005c0)='cgroup\x00', &(0x7f0000000600)='veth0\x00', &(0x7f0000000640)='veth0\x00', &(0x7f0000000680)='/dev/input/event#\x00', &(0x7f00000006c0)='/dev/input/event#\x00'], 0x800) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfp\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty=0xffffff7f00000000}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2c6, 0x0) 15:24:04 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:04 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2c7, 0x0) 15:24:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:04 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:04 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:04 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:04 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2c8, 0x0) [ 602.101759][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 602.107555][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfu\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2c9, 0x0) 15:24:05 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:05 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:05 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2ca, 0x0) 15:24:05 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) sendmmsg(r1, &(0x7f0000000100), 0x5bd, 0x0) r2 = accept4$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f00000001c0)=0x1c, 0x800) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0xc8, 0x81000) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x7a, &(0x7f0000000100)={r5}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f0000000400)={0x7f, 0x80, 0x0, 0x10001, 0x200, 0x5c, 0x8, 0x8, r5}, &(0x7f0000000540)=0x20) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000200)={r5, 0x4, 0x8000}, 0x8) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r9, 0x110, 0x3) connect$rxrpc(r9, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r9, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000010010000000000770000f20000000000"], 0x18}}], 0x1, 0x4048000) close(r9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) prctl$PR_SET_DUMPABLE(0x4, 0x3) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r10 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r10, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:05 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 602.901762][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 602.907559][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:05 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) r2 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r2, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r4}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r3) sendfile(0xffffffffffffffff, r3, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:05 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfx\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2cb, 0x0) 15:24:05 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:05 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 603.141772][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 603.147555][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:05 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) r2 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r2, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r4}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r3) sendfile(0xffffffffffffffff, r3, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:05 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2cc, 0x0) 15:24:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="18c3b356010000001001000001000000770000f2000000007b5576eb08852f376429cbfe4e1880d3b8c930f4be7886cf1ad8753319677d259490a9f3774fdd968d2cbd279c201b7828dcd4b7c267"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:06 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x02', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2cd, 0x0) 15:24:06 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)) r2 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r2, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r4}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r3) sendfile(0xffffffffffffffff, r3, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:06 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:06 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2ce, 0x0) 15:24:06 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:06 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0x0, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2cf, 0x0) [ 604.181764][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 604.187558][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x1, 0xbbe0463829496555) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r6, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x104, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f00000004c0)={0x9, 0x108, 0xfa00, {r7, 0x10, "af8daa", "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"}}, 0x110) r8 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r9, 0x110, 0x3) connect$rxrpc(r9, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r9, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0e0077003f4e8c8400"/24], 0x18}}], 0x1, 0x4048000) close(r9) r10 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x6, 0x9d0e72d827706534) getsockopt$inet_IP_XFRM_POLICY(r10, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0xe8) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r11 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r11, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x03', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:07 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:07 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2d0, 0x0) 15:24:07 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0x0, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:07 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x48, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:07 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2d1, 0x0) 15:24:07 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 604.901764][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 604.907840][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 604.913623][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 604.919525][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 604.925293][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 604.931032][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:24:07 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0x0, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) [ 604.991767][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 604.997539][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:07 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) r5 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=[@decrefs], 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r8, 0x40a85321, &(0x7f00000001c0)={{0x8, 0xad}, 'port0\x00', 0x2, 0x8, 0xbe3, 0x3f, 0x7fffffff, 0x840, 0x3f, 0x0, 0x4, 0x10000}) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r5) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r9 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) write$P9_RCLUNK(r12, &(0x7f00000000c0)={0x7, 0x79, 0x1}, 0x7) write$evdev(r9, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f0000000280)=0xe8) r14 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$get_persistent(0x16, r13, r14) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:07 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x68, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x04', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:07 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2d2, 0x0) 15:24:07 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:07 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r4}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r3) sendfile(0xffffffffffffffff, r3, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:08 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:08 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2d3, 0x0) 15:24:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:08 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x74, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:08 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2d4, 0x0) 15:24:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x05', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:08 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getrlimit(0x4, &(0x7f00000000c0)) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r7, 0x404c534a, &(0x7f0000000240)={0xffff, 0x400}) close(r4) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) syz_extract_tcp_res$synack(&(0x7f00000004c0), 0x1, 0x0) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r8 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r8, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) ioctl$VIDIOC_ENUMINPUT(r3, 0xc050561a, &(0x7f00000001c0)={0x2, "22c807116aac117f0e7e4918cf5b20ab44fccf09e023b214e7d73b39a8bbfcf2", 0x1, 0xfffffff8, 0x1, 0xf4, 0x100, 0x8}) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:08 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r4}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r3) sendfile(0xffffffffffffffff, r3, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:08 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:08 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2d5, 0x0) 15:24:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x06', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:08 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2d6, 0x0) 15:24:08 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:08 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:09 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r4}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r3) sendfile(0xffffffffffffffff, r3, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:09 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:09 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x57db9b78d614c828, 0x0) r5 = socket$inet(0x2, 0x80000, 0x2) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0xffffffffffffff91) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) r7 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r7, 0x110, 0x3) connect$rxrpc(r7, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r7, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r7) getsockname$unix(r7, &(0x7f00000001c0), &(0x7f0000000240)=0x6e) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) ioctl$VIDIOC_G_ENC_INDEX(0xffffffffffffffff, 0x8818564c, &(0x7f00000004c0)) 15:24:09 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2d7, 0x0) 15:24:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\a', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:09 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:09 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:09 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:09 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2d8, 0x0) 15:24:09 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:09 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:09 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2d9, 0x0) 15:24:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\b', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:10 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:10 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:10 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=ANY=[@ANYBLOB="0763042597c15cff"], 0x0, 0x0, 0x0}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f00000001c0)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x1ff, 0x200000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20002}, 0x0, 0xffffffffffffffff, r4, 0x0) fcntl$setstatus(r5, 0x4, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x2000000000000021, 0x2, 0x10000000000002) r7 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r7, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) sendmmsg(r7, &(0x7f0000000100), 0x5bd, 0x0) r8 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r8, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) sendmmsg(r8, &(0x7f0000000100), 0x5bd, 0x0) r9 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r9, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) sendmmsg(r9, &(0x7f0000000100), 0x5bd, 0x0) sendmmsg(r7, &(0x7f0000002a40)=[{{&(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, r8, 0x4, 0x1, 0x0, 0x3, {0xa, 0x4e24, 0x968, @remote, 0x7}}}, 0x80, &(0x7f0000000a40)=[{&(0x7f00000004c0)="615264b3949c7c2e31157e5587eb6f22dad4be0099dd78c8e52d838c69236ee0cf73a61c0f2a5850cc3c40c29f2ada95a1275484812cae7103232f9053534086ef18233746e48044f2b2c964ba06cb084e3b83b73403aa13770f70ab5883acbdde394b9d9c72d77d68d7740985c633e59bbfa93baa1c79a705b8a51754b3a919368d8d4333bbd876d8e072e1eec82be1bebefd75ba511e3ae4a149cd143f6dee5460fd4f834caa700165bafb89bd886b83ba2b802faec93a6a247fd80c1f981d2f81c80ffc003c402032fceb45e320caf4eb9a78c375918593770b958153875dbe788da78c24b2146c10efbc79cd7cea0e798cbef010c43f00", 0xf9}, {&(0x7f00000005c0)="0ff8b6cbd5ae28a9581c28de04ea12eb61cdd95c596aad81e5f323c50333beb703", 0x21}, {&(0x7f0000000600)="40900bf192545736f4b262277499295454f522bbba67d53c3abe5092407121dc5f48fdc47570124e22b0b4c500df53ea0c0112e62bdaac9411270d62fb63eef43e68f1e2e0be0112b9ed51f04536a130c1f1e855b3462e6124c3d2c9f6ae0ecf1c8b2625da0fc2749f3dae33b5bee7865d86a249bc", 0x75}, {&(0x7f0000000680)="8560df4d5ab875b01df4d305fcdd19b0877188e7a2286aae934978c7bd326111d92ecc377010a951a070d33e4ff0b9a8d893fdf0f04346e965def24df193110983a80c545a15bca44594518e76eb1e10a02a8f974c90a2023bb3075c5b02a5f7c45d060bbc42dbc3ba56972d987d7ebe8be6e92a6e23afdd0205f829992f05aa9ed8ddef7633866b5ee6b1314e70bc54b937853db987e8dfa03aa6b6530c1cf200ff86f6e5d5cb58f91f16c5e873dce1c4b16dff61562fb7f82e141d8ae0caf6fa213f1dffd8d8b53d70b4a783a808ddaa8f7d944e6b85c8c9fc688abf", 0xdd}, {&(0x7f0000000780)="403c7abb14b41670a4680df7800c97fb9d658671f4d044aff77110a7528980c597cece0187f544d69e81bee82d3d5c8e904fc49a5426c0c4eca1ac0808a6f091bff81ce06a4fe649e7dfe6153a94b0c9e84d3852fda4f545104aac7d5ac998be617eaa51a49a5c7d77f2212509c90ae9e9f689fa1d86f77b62430a0bdf942602b1e9f7a4d6ba7ef66339028aa80573a75c7f588fc845ae5f7ee5d7c7db62b7e8e30bbef54a0640df5fca14f529d57025dd9ac323d297fe7b56f85e75a6dff54fcbc4cc079140e5a6572ee233db05208902f0bc00c462c0dad286dd07d6adb2dc34b6d27df71722", 0xe7}, {&(0x7f0000000880)="d76c3ab2becee10d0ca1ead9353220eaf19a9aa66d0c116846813236e0c659d4", 0x20}, {&(0x7f00000008c0)="178f7c99a263ef553d086b66c623c75f5548d1baeef7c6e216ada3f8f436851865d7a3754c94cfe1dbdf50d7b167e9c2dad16eb59db1c0fe431bff2ddd838dc60ab9aa7e11e862160b80a73acf359a5b69f6d48dba172f000c7312d1366f868c1d3d37fc0fb160108b20ba03193bde3da5a78f4ac944e4b393371570364906e9f845ae743ad09acc4168123fdb00bfbd09174cd629b7c99f72964ecf512326b7940a8f7ce0fcae3891f0a6bd511806893bdff3cee9ef1e398f3c4410a786d461c4f096795b5b19973343215a5f8a3d3680fde5e609fb79429f257a3169b375", 0xdf}, {&(0x7f00000009c0)="3ec31de041a0a7f5240a5e4a719c3f5d5ca7befd83d471459318d11b400b57fb264496a500081a168101008b4107fc098f7b209848c52196028a7c8c0c3b3b370c8227ee581d11cda6d20c11c066e25cd2c4b56a94a7b9911cc18c58eb91cbb87bfe3232ff2b840ce4fb96", 0x6b}], 0x8}}, {{&(0x7f0000000ac0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r9, 0x1, 0x1, 0x3, 0x3, {0xa, 0x4e24, 0x7fffffff, @loopback, 0x3aa}}}, 0x80, &(0x7f0000001cc0)=[{&(0x7f0000000b40)="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", 0xfe}, {&(0x7f0000000c40)="cd815496b3e298c7fa35b8c285b54f5a1b36baff20cf5012269e51988afeba8641b903bdd9a64f3188181b4cffbc33ad7105ff5856dcfacc0c6d0ac5b0d15842b70456f5702b61e77fcaca68c7e3e29dc2707ec4e385f089eb2e6a751f", 0x5d}, {&(0x7f0000000cc0)="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", 0x1000}], 0x3, &(0x7f0000005c40)=[{0x28, 0x112, 0x3, "66066ff6dee66553c287298d452994c9d97e27"}, {0x78, 0x11, 0x0, "228a0c00c2f3cfc14b9a2b2d5ef0b8eaeb4a57a001d1f0971c6dc66fa8713b3f89f6c224f47b39d42c2fb0d365549973fd51dabc8d89835c473a89eaee9b69dc7f0ca675d307ebe497d5ba1ce1a7696211b1a8358fed7aafcc2370b1ff8c074a414ada7be86ba0"}, {0x20, 0x102, 0x8, "470087c16f16b55e33bf5b0fb5e3"}, {0x1010, 0x1d5, 0x7fff, "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"}, {0xc0, 0x0, 0x80, "40baabb4694354e38368b326ee28555f63a825b01283c53dc6761b3a62bc79f02795a54de71c1501b4355d7636725c2dc2b39b0b28d69e408fdad6fcaccc9d4c99916ae228c63ddd4ece672d5441ed09e01f7c5adb6f54a211bee11097e94ba7086d04474dd13d75cfb510a6e0ce316b1923f8595f190d0cbe071e0459dd460a06a3098ec832761cb68326b0e4a3d2d72192514b5fa9c298d9f812d13558867dabcd4186562c03ecca76386fc9568ebf"}, {0x1010, 0x103, 0x40000, "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"}, {0xc0, 0x105, 0x1, "d078b1c495b8e9f9c970ee4f35e0e5f5612928518f638f7e9918ab970dc41d7b0deece4ac2b72299c71f1c007fe4725d702ddf46a6bde2e5a6e7967a3c16855e5c137b024b2d1ad3d352099507f7ab5f0c4030ae70fd735d67765b7e92c3d551dd89486f12c1db215d8e1573b60dcbb4cabe47fc29d8124da4b6753ace9267c60fbe2b8363922fafb90d3e5ec2b786c16e144b3fbb7376f46be6bcfffccd656bc30915dd27189fd61e508e7b6254"}, {0x1010, 0x114, 0x10000, "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"}], 0x3270}}, {{&(0x7f0000001d00)=@pptp={0x18, 0x2, {0x1, @multicast2}}, 0x80, &(0x7f00000020c0)=[{&(0x7f0000001d80)="33d014a239f8425e034e5e41606aaa76625baebe2a59f5c15b74f6fda7bb149a356e", 0x22}, {&(0x7f0000001dc0)="96844b66ea03362d491a21f1f694e8b74d4ed2874c91f6da39e846575e0c8686b62a4eea98d3ba57a9c8bf90b61f2f25b243d551972a415a396f1c5192fc480c53e0f4c694aacfed77f7cdbdfa6740266c47568f4844a88d5fa840b875cdb71ab6d892fc8b362da2bf56293e1cea6b6b3cec47e0131870a358051edbcbc7ab04d5c640041b461d4bcce3dd02c7f97f5045491328162945fdbc0e8b1368329a795c35ac991b9b1b91dd217b2b25a1b3be267a42cb071d37334adac31e449b14d4900951035d8220fc9f771fca3cd27a0460dc7f9c4efc1ce4cbb994074fae1a12e2eefe83637e04db", 0xe8}, {&(0x7f0000001ec0)="8aa153dd0ea4d47f3e6d6f15ccad241dffd50e261a7b313a6918aa0c4f1d13275d67ffa0305e9f8db424863ff163b6b0a541946b49ab436f21e0e119798b3afe64b39c763b6c1a2f30166393a03609215230413d3f465f187b445e45579d6be1c83e2ac5453ae60f186a2e5a580e6558e2ae0b291bc93c1f5a97e20c4e0022834d88b88a84d2e0b18ed9dd6117964063cde5679b80498d46e7ee7ecc477f9a1c5980217c125da9f0ea970c4028c733a15c40f344a5539f3f6bf869d6fafacd3708e9120ce05b3e0b49fceb8ecfa65d4518763852b411a7e62b55cf63a7cc", 0xde}, {&(0x7f0000001fc0)="d5360c5b5df47a9f0ae7b88a421a0fe305a975ee269227e40f9af351e87dc810ffa08635b15583935010a4ee0dea84e7444c90d4f0b0c940a7630c425b99cb8b94767cbcd822dbd56846aa3040308ca7311284038b2c998ec26219892810b20c5397ffe9b0b4de80aa5d1c5406ae6dce7855d66e7ecb1d7d8e58c3fe4bad6b7d00ef6c963508ba8d724205016c37a1505464135bca854cf91ca15ba37230574f7797c3766a9cc46ceb8ebc45374779e1590e3e41af20cb4a6194350adf", 0xbd}, {&(0x7f0000002080)="ec148c4dc41edfdd1230d905b69cebaf56c92dd0f3526f859466", 0x1a}], 0x5, &(0x7f0000002140)=[{0xc0, 0x29, 0x7fff, "a0f635a23a86acd6a12cc2b9ed3a977f298d4d25cf9c6102e1a38ea05987fa44c572bbadea77bc85813ae2229df896e52833846d1f1cd7dc84f9ba373abb3d0d5597af6074913043991ae26b5eee9f2f6ca282108815aa89f80bb74f337cd15dde96561d1eb80f26a94b0cc62926385889424aa75ffac87aac16e4df0bc9e88adf47e443bc1801ba6daae2d7af3742ffaf38f768e5390f2255637a43fe098aeda424712268ac418c260ae7c76f71d237"}, {0xa8, 0x1, 0x0, "71fb573a70805b93bf5a23d598e3e2e06fb9d9bda44d0507477f35ac2d7ecf4aab5bde51e2adf5356b1401a8025b2954d3addc99233c5888767198642ad91c0f68b6026bdab3eebf081e78779ea7ed9ce3ed0d05c66abceff75825870f656126fea36b7b1475e040248e889c81c89e62ec1ce6417679100df256ca44f8dd0293988b138790a22550fbb80f7c5dca212a4d5a77a5b3"}, {0x88, 0xed45dd7d63ab55eb, 0x80, "a7ea8bbd3b48e055a08be2dbac1d5e365ed1a0c18662f10edc8e453204a80140c9312011138564b6420072ef9b3d7606efd9827e3030620ccd17a241a35c375b428852a49d46e1eccd7d5bb32a542b0d3eb0eef9e77f0beef340b709e3e20aa345da18e2afd254a03cc61bd4f9219e95e5fcd399e5bbcf"}, {0x70, 0x111, 0x9, "67016a590ef6ed042482543dc876795bdf3a71f480197f7fa8f1c7bf89db676a0b664159f5ae12e8b98fed77d9ed02fc877c0f92323875c7ee366b64067fb179f1552701263ed107e01da3a2d51f6eb6dda8aaeb207b60a28896"}], 0x260}}, {{&(0x7f00000023c0)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000002980)=[{&(0x7f0000002440)="c48e42799ac10bd286eafa981cf79cdd6f90a8ab40de", 0x16}, {&(0x7f0000003240)="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", 0x1000}, {&(0x7f0000002480)="3733cb0fd2123647f6f9e432d8bd90de15bef6a1414a64932c7100e7df6bc3918bdef37a3075b20425c64a5cf5e322dcc3296129abe0dc68d521274dd0508434e53cd2c31c175e4f7961d32e9a0343f02df29f1c556abeff499225fe140d88d560560447a0d65d8955372c68c82ea925eaf19ba6c05041677579f87b7bdabd0197697ba082f08793ecbeb53caf5f19440b00b536f99626654116bac7980d57add9", 0xa1}, {&(0x7f0000002540)="bafa579d44d67ae90714ff89366f323354892aa9a21376a904fe37d419e659bc3c81a6cb6168", 0x26}, {&(0x7f0000002580)="9ef8e479cb77d3cd52b835e41cd08def78fc26eb2c3c91445c3c2255589941d71a6f288a4788ae2faa3cf3fc5e37d5dab77e41c3850c81f7bf38dc612dfc19f81d09cb0a749bebc0e8e034838ba934b75411b4d9d517cfb0da6fdded7fbd2f47404300fa526311667e8b24174c0a2c7cb2b0121025a9ec9e14bd2bb19721bff1ae73db9cf974a3d255771bde6954acbb1da10fa92b453e35f54fe289c6b3982870ab40e5b4018a21f5d5eed1b77d7208d7103c40d5be5f449a836b1fcc51a42f45e0040b6fb352472a2b220cf6a9", 0xce}, {&(0x7f0000002680)="28a484923ad65a39d3eebf086c210c97005117ad0a2fd0e2e1fc09fadec926fc473f1d5d374532db02a38ccf272f20840670743a9685154ef1f3a8b33eb37ffef9fb590cf91dd5865f35c4114d1392d5e041c13d398f5cbce0ab08a00183880c1de25c1f457a53bfdd39218fbbdd96962c3cf4d37736be82a658d2f9b09795b929d203d9ee8429c39dd8d6b876389253dfa00cf686a7", 0x96}, {&(0x7f0000002740)="66808df380c14f8640b7076c56aa5656b987cc81d918affa97209cf17aae0e47c1b65a7e8b1c4f50aa0f680847b6099d6d15c39c2c6a4cfcb7cd9fcc878899887b5389ae9204ec01371fd82f3100d4fafab41b1373552bb4d3", 0x59}, {&(0x7f00000027c0)="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", 0xff}, {&(0x7f00000028c0)="8cf81247be488f25063dc5f90f8f9d7efd4db3f1ae060bcf688f16bfb5810525e1c1570ed88ce0615ee23081dc62e48590fbc1e4347e2ff1dad55215a9a716a0dc1c3ceeb1a86b7e070d6207ee18489219df61456e287be8eae2910d8d432243a0bfefd45b167f843b3dc69635e59d2c88eaaba9b8a1e67e213b9b6722a134d56cb0631f604caf05dfc7b2b189d585750621f54f75c75a44e13ddf81bad3a502a959f7bbff01e37d2e89f7b097988242", 0xb0}], 0x9, &(0x7f0000004240)=[{0x98, 0x1, 0x400, "e49f7c4fc09d57d6b813d430ccba095add206be2d39c38f3bdd4e5929464dc6ce040bda19e490a30d3f91d330e2f7d8cce6f14d96ff78aa7601c0dcc128c27cfbb5ff703ee907a455987a403f5d993ec06467fdec997613f209e5e61ea893eacc5be030e6f3a235a20129f7ec8fd380ec24ed71baa05f62d5e15b0d04e64ea7e0e0b4e4b92c682"}, {0x68, 0x109, 0x634, "0224fe9633da73050658586994736ca85f8f1d2f62b1226f3f5dadc8bc4544cff99fd3520b91d4e945c526b565a56b91af39cf7beb81e3b85ccda76241a3e399820844802711f86bb5816cf8b77e3e799b18d138ca8018d0"}, {0x1010, 0x105, 0x4, "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"}, {0x58, 0x192, 0xff, "27691e07b9f7c7ee60ffdb8070ce1d0f7403b3111f84808d6dbbde26d0e014267610adb16b519b7a95159f5c2483e54b835acc4933d3c726ec62a554abd5033fd7c43bda8b"}, {0x40, 0x1, 0x7f, "249a203cc4aa5d839e969d3e0224af4765d05b88ff80babb7122821600930d9c2485843ef919b1d631f111"}], 0x11a8}}], 0x4, 0x8000) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r6, 0x110, 0x3) connect$rxrpc(r6, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r6, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000070000000000776df08cbfec0000881fc45067e7891029e7592d"], 0x18}}], 0x1, 0x4048000) close(r6) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r10 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r10, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:10 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 608.350947][T26427] binder: 26425:26427 unknown command 621044487 15:24:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2da, 0x0) [ 608.401643][T26427] binder: 26425:26427 ioctl c0306201 20a20000 returned -22 [ 608.438410][T26427] binder: 26425:26427 ioctl c0096616 200001c0 returned -22 15:24:10 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={0x0, r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:10 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x10', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:10 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2db, 0x0) 15:24:10 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:11 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={0x0, r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) [ 609.223154][T26438] binder: 26425:26438 unknown command 621044487 [ 609.231650][T26438] binder: 26425:26438 ioctl c0306201 20a20000 returned -22 [ 609.241758][T26468] binder: 26425:26468 ioctl c0096616 200001c0 returned -22 [ 609.381769][ C1] net_ratelimit: 16 callbacks suppressed [ 609.381778][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 609.394093][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:12 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2dc, 0x0) 15:24:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfsH', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:12 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={0x0, r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0xd7, 0xff, 0x7, 0x8}, 0x11) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) r1 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) connect$rxrpc(r1, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r1, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r1) bind$rds(r1, &(0x7f00000001c0)={0x2, 0x4e20, @remote}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_S_PARM(r8, 0xc0cc5616, &(0x7f00000004c0)={0x2, @output={0x3000, 0x1, {0x8, 0x1ff}, 0x1ff, 0x7fffffff}}) connect$rxrpc(r5, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r5) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r9 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r9, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:12 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2dd, 0x0) 15:24:12 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000ebffffffff0f0100000100000010c200f20000000018e532b4fb50e4549e25070000006c953915ceef8465055d70e42e4bb5613680983bb4000000000000000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:12 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:12 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfsL', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2de, 0x0) 15:24:12 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:12 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:12 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2df, 0x0) 15:24:12 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) [ 610.421765][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 610.427575][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:12 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2e0, 0x0) 15:24:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0xe8) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfsh', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:13 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:13 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00'}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r5, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2e1, 0x0) 15:24:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2e2, 0x0) 15:24:13 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:13 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 611.141764][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 611.147572][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 611.147602][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 611.159054][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 611.164821][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 611.170548][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:24:13 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:13 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:13 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2e3, 0x0) 15:24:14 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4, 0xfa00, {r8}}, 0xc) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r9 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r9, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:14 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:14 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xff00, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfsl', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:14 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2e4, 0x0) 15:24:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:14 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2e5, 0x0) 15:24:14 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:14 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:14 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:14 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:14 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2e6, 0x0) 15:24:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfst', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:15 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:15 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:15 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2e7, 0x0) 15:24:15 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="4b00000008000000050000000104008bd9000000000000010000808f0700000800000066f9ffff810000009318069ef41df9e47157ec152e92c9a1b00f010000000300000009000000008000000100000005000000710000000122467f9580982d8509bcb4de30"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) ioctl$sock_bt_cmtp_CMTPCONNDEL(r4, 0x400443c9, &(0x7f0000000200)={{0x1, 0x2, 0x6, 0x6d, 0x1, 0x2}, 0xfffffffb}) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) r5 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0xc8, 0x81000) r6 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r6, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="30919aee", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r6, 0x84, 0x7a, &(0x7f0000000100)={r7}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000400)={0x7f, 0x80, 0x0, 0x10001, 0x200, 0x5c, 0x8, 0x8, r7}, &(0x7f0000000540)=0x20) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(0xffffffffffffffff, 0x84, 0x79, &(0x7f00000000c0)={r7, 0x4, 0x4}, 0x8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r8 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r8, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000001580)={0x6834a78773eea46a, 0x0, &(0x7f0000000580)=""/4096, &(0x7f00000004c0)=""/14, &(0x7f0000000500)}) 15:24:15 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:15 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2e8, 0x0) 15:24:15 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:15 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:15 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2e9, 0x0) 15:24:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfsz', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:15 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:15 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:16 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="43c0c77d351800000000200000770000f200"/29], 0x18}}], 0x1, 0x4048000) socket$caif_seqpacket(0x25, 0x5, 0x0) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x10c) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) ioctl$sock_inet6_SIOCADDRT(r4, 0x890b, &(0x7f00000001c0)={@remote, @mcast2, @remote, 0x1, 0x80, 0x5, 0x80, 0x9, 0x800000, r5}) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:16 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2ea, 0x0) 15:24:16 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:16 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:16 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:16 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2eb, 0x0) 15:24:16 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:16 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:16 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) [ 614.581770][ C1] net_ratelimit: 16 callbacks suppressed [ 614.581778][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 614.593183][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) r6 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r6, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=[@decrefs], 0x0, 0x0, 0x0}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r6, 0xc0506617, &(0x7f00000001c0)={{0x1, 0x0, @reserved="05b4c377513df86cdc9e27c2d39d75e6810c058d8c13c292e17c79bdcfac8a57"}, 0x7b, [], "5537bea08aec834298def37b49a3e1033760060fbeb816c68aa3c0f1d302258ad1ba4ea849d87411a9562e646f047655bb370cd27be26fb896d6098034a50858f7b434736012d9f001db76d81df891fd4e106033ccaeac7c2a8386e181c6d9e85ebbae39640487014830bc0e7cf7bc1061cec3af0c48d258037905"}) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:17 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:17 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2ec, 0x0) 15:24:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:17 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2ed, 0x0) 15:24:17 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:17 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 615.301768][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 615.307558][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 615.313509][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 615.323083][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 615.328829][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 615.334579][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 615.381766][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 615.387577][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$uinput_user_dev(r7, &(0x7f00000004c0)={'syz1\x00', {0x800, 0x6, 0x8, 0xa50}, 0x4b, [0x1, 0x10000, 0x1f, 0x4, 0x7, 0x2, 0x78cf, 0x7, 0x5, 0x0, 0x401, 0xec, 0x86a, 0x6, 0x1, 0x7fff, 0x80000001, 0x10001, 0x49b2, 0x3056, 0x6, 0x0, 0xffffffff, 0x81, 0x3f, 0xfff, 0x0, 0x5, 0x40, 0x0, 0xffffffe1, 0x3, 0x2, 0x8, 0x8, 0x1d1c, 0x9, 0x38, 0x1, 0x8000, 0x2, 0x8000, 0x0, 0x8000, 0x9, 0x3, 0x400, 0x4, 0xd5f, 0x4, 0x9, 0x2c6, 0x20, 0x8, 0x7, 0x9, 0x5, 0x1, 0x3, 0xc36f, 0x6, 0xbd82, 0x5610, 0x5], [0x26b8c4a5, 0x0, 0x5, 0xff, 0x4, 0x1, 0xffffffff, 0x5, 0x401, 0x8, 0xfffffffb, 0x4, 0x5, 0x8001, 0x100, 0x7, 0xb074, 0x400, 0x9, 0x7ff, 0x5, 0x0, 0x4, 0x8, 0x9, 0x3, 0x8, 0x8, 0x8, 0x4, 0x7, 0x1, 0x6, 0x20, 0x81, 0x6, 0x5, 0x9, 0x4, 0x6, 0x8001, 0x4, 0x9, 0x9, 0x9, 0x5ae, 0x1, 0x6, 0xd1, 0x8, 0x800, 0x8000, 0x3, 0x2125580, 0x8, 0x6, 0xa0, 0x6, 0x7fff, 0x60, 0x5, 0x22e6, 0x401, 0xd0], [0x3f, 0x5, 0xd3b, 0x4, 0x9a20, 0x8, 0x200, 0x2, 0x4, 0x3, 0x7, 0x3, 0xffff3ae3, 0x2, 0x7fff, 0x4, 0x6, 0xcd18, 0x9, 0x4, 0x0, 0x2, 0x2, 0x80000001, 0x9, 0xf4cc, 0xa8f, 0x7fff, 0xffff, 0xee5, 0xff, 0x40, 0x1, 0x4, 0x2, 0x3, 0x80000001, 0x7, 0x6, 0x1, 0xff, 0x1, 0xffff, 0x5, 0x10000, 0x3800, 0x4, 0x100, 0x7, 0x0, 0x2, 0x1, 0x4, 0x285, 0x3, 0x7, 0x1, 0x81, 0x4, 0x7fffffff, 0x3ff, 0x0, 0x1, 0x1f], [0x12000000, 0x1ff, 0x9, 0x4, 0x9, 0x7, 0x5, 0xfffff0fb, 0x37, 0x1000, 0x5, 0x1, 0x800, 0x9, 0x1, 0x80, 0x8001, 0xffff, 0x8, 0x7, 0xfffff001, 0x1, 0x8000, 0x2, 0x1, 0xff, 0x40, 0x800, 0x6, 0x11d5, 0x1000, 0x6, 0x9, 0x7, 0x2, 0x401, 0x7, 0x3f, 0x3, 0x80000000, 0x27, 0x40, 0x7, 0x40, 0x0, 0x2, 0x8, 0x80000000, 0x200, 0x0, 0x1000, 0x0, 0xfffffff8, 0x6, 0x4, 0x8, 0x3, 0x1859, 0x9, 0x5, 0x5, 0x4, 0x3, 0xfffffff8]}, 0x45c) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r8 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r8, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:17 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:17 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2ee, 0x0) 15:24:17 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:17 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:18 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:18 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2ef, 0x0) 15:24:18 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:18 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:18 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001041a004800000000010000808f0700000800af33000066f9ffff81000022a1fab00f010001000300000009000000cb29bf7dc2a9064b05000000710000"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) connect$rxrpc(r5, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f20000000097a8035c5155abf80dabab1cf602d41d124a439ce1790ed65d7de65f00733457607f1dca26e9de90bec6ddff6c16a402931f1a4085ae9dd0a6fe648f1b4054ecc0661287272d266ded9055fd3c082a2ed361585c"], 0x18}}], 0x1, 0x4048000) close(r5) ioctl$sock_inet_SIOCGARP(r5, 0x8954, &(0x7f00000001c0)={{0x2, 0x4e20, @multicast1}, {0x6, @local}, 0x20, {0x2, 0x4e24, @empty}, 'lapb0\x00'}) r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:18 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:18 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2f0, 0x0) 15:24:18 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(0x0, 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs?', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:18 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2f1, 0x0) 15:24:18 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:18 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:18 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2f2, 0x0) 15:24:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:19 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:19 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) fcntl$addseals(r2, 0x409, 0x4) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) r6 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r6, 0x110, 0x3) connect$rxrpc(r6, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r6, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r6) getsockopt$TIPC_CONN_TIMEOUT(r6, 0x10f, 0x82, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) 15:24:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs ', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:19 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(0x0, 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:19 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2f3, 0x0) 15:24:19 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:19 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:19 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2f4, 0x0) 15:24:19 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:19 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(0x0, 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:19 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:19 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2f5, 0x0) 15:24:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:20 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:20 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2f6, 0x0) 15:24:20 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:20 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:20 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2f7, 0x0) 15:24:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:20 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:20 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x20000, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0xc8, 0x81000) r2 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x7a, &(0x7f0000000100)={r3}, &(0x7f0000000180)=0x14) socket$bt_cmtp(0x1f, 0x3, 0x5) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000400)={0x7f, 0x80, 0x0, 0x10001, 0x200, 0x5c, 0x8, 0x8, r3}, &(0x7f0000000540)=0x20) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000a40)={r3, @in6={{0xa, 0x4e20, 0x6, @loopback, 0x1}}, 0x3, 0xe3a}, &(0x7f0000000a00)=0x90) r4 = socket$packet(0x11, 0xa819a61e5c72f50b, 0x300) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000004c0)='cubic\x00', 0x6) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r8, 0x110, 0x3) connect$rxrpc(r8, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r8, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r8) r9 = socket$netlink(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r9, &(0x7f0000000000)={0x0, 0xe2, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="050000000000000000000300000058000100100001007564703a73797a300000000044000400200001000a00000000000000ff02000000000000000000000000000100800000200002000a00000000000000ff01000000000000000000000000000100000000"], 0x6c}}, 0x0) sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000009c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x10080000}, 0xc, &(0x7f0000000980)={&(0x7f0000000600)=ANY=[@ANYBLOB="5b030000", @ANYRES16=r10, @ANYBLOB="020029bd7000fedbdf250800000020000600040002000400020008000100080000000800010000080000040002003c000900080002000900000008000200090000000800010001000000080002000500000008000200740f000008000100640a00000800010002000000400004003c000700080002000100000008000200350d000008000200ffffff7f08000300ffffffff08000400ff0100000800020002f0000008000200ff07000094010500440002000800020000002000080002008000000008000200010400000800010012000000080002000700000008000400070000000800040002000000080001000c00000008000100696200002c00020008000200ff0f0000080003000700000008000100110000000800030074c2000008000400830000004400020008000400fbffffff080001001e000000080004007f000000080001000500000008000100110000000800020006000000080003008000000008000100090000003c00020008000100200000000800040000000000080001000b00000008000200020000000800030006000000080002000000000008000200000001004400020008000400bc0000000800030006000000080002000200000008000200c3e00000080002000500000008000200ff0f000008000400010100000800010004000000080001006962000008000100756470003c00020008000300e1000000080001000e000000080001000a000000080003000800000008000300ff07000008000200400000000800020003000000080001007564700014000900080002000000000008000200050000005400090008000200309700000800010001000000080001000500000008000200ff03000008000200000000800800020001000000080001005400000008000100faef000008000200ff00000008000100030000003c00020008000100ff7f00000400040004000400080002000000030008000100040000000800020001000000040004000800010020000000040004003c0009000800020000000000080002000002000008000100000000000800010000000000080001000000000008000200000000000800020095b700000c0007000800010008000000280004000c00010073797a31000000000c00010073797a31000000000c00010073797a3100000000"], 0x358}, 0x1, 0x0, 0x0, 0x4000}, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r11 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r11, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r4, 0x107, 0x13, &(0x7f0000000180), 0x4) r12 = syz_open_dev$audion(&(0x7f0000000500)='/dev/audio#\x00', 0x140000000000, 0x1) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r12, 0x84, 0x1e, &(0x7f0000000580)=0xb8, 0x4) 15:24:20 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf9fdffff, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:20 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2f8, 0x0) 15:24:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:20 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:20 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0xfffffffffffffe89) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:20 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xff000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:21 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2f9, 0x0) 15:24:21 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r6, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r6, 0x5412, 0x711000) syz_open_pts(r6, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r7 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r7, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r9, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:21 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x10', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:21 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2fa, 0x0) 15:24:21 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:21 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:21 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) connect$rxrpc(r5, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r5) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000001c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x27c) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:21 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2fb, 0x0) 15:24:21 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, 0x0, 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:21 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:21 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:21 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:22 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2fc, 0x0) 15:24:22 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:22 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, 0x0, 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x0f', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) [ 619.781757][ C1] net_ratelimit: 6 callbacks suppressed [ 619.781765][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 619.793118][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:22 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="0001440000480000001f00000000000000010000008100000001008e2c202d78de1c26000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EVIOCGRAB(r6, 0x40044590, &(0x7f00000000c0)=0xf8) r7 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r7, 0x110, 0x3) connect$rxrpc(r7, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r7, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r7) r8 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000980)='/dev/autofs\x00', 0x400000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f00000009c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xfffffffffffffebf) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r9 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r9, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:22 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:22 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2fd, 0x0) 15:24:22 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:22 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, 0x0, 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:22 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:22 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:22 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2fe, 0x0) 15:24:22 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:23 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) [ 620.821764][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 620.827580][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:23 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r2, 0x6) r3 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r3, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r3, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r7, 0x110, 0x3) connect$rxrpc(r7, &(0x7f0000000040)=@in4={0x21, 0x0, 0x2, 0x0, {0x2, 0x4e21, @loopback}}, 0x19) r8 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r8, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=[@decrefs], 0x0, 0x0, 0x0}) io_uring_register$IORING_REGISTER_FILES(r6, 0x2, &(0x7f00000001c0)=[r8], 0x1) sendmmsg(r7, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x4048000) close(r7) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r9 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) r10 = gettid() tkill(r10, 0x16) write$P9_RGETLOCK(r6, &(0x7f00000000c0)={0x24, 0x37, 0x1, {0x0, 0x1, 0x9, r10, 0x6, 'veth0\x00'}}, 0x24) write$evdev(r9, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:23 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:23 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x2ff, 0x0) 15:24:23 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:23 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:23 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x300, 0x0) 15:24:23 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:23 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) [ 621.541768][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 621.547554][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 621.553324][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 621.559054][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 621.564810][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 621.570539][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:24:23 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:24 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000770000f200"/24], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x301, 0x0) 15:24:24 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:24 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:24 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x302, 0x0) 15:24:24 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:24 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1000000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:24 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x303, 0x0) 15:24:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:25 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) r5 = socket(0x12, 0x4, 0x8) setsockopt$CAIFSO_LINK_SELECT(r5, 0x116, 0x7f, &(0x7f00000000c0)=0x2, 0x4) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0xe8) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:25 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:25 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:25 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x304, 0x0) 15:24:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:25 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:25 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:25 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x305, 0x0) 15:24:25 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\xc0', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:25 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000008000000050000000103ee00480000fe1e0000e79d0000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f010000000300000009000000008000000100000005000000710000000100"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001012000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) r5 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x8, 0x8182) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0xfffffe86) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) sync_file_range(r4, 0x1, 0x1, 0x5) r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:26 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:26 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x306, 0x0) 15:24:26 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:26 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:26 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x307, 0x0) 15:24:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:26 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:26 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs@', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-control\x00', 0x200, 0x0) r5 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm_plock\x00', 0x513900, 0x0) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000500)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f00000004c0)=0xe8) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:27 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x308, 0x0) 15:24:27 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:27 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:27 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x309, 0x0) 15:24:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 624.981757][ C1] net_ratelimit: 12 callbacks suppressed [ 624.981765][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 624.993342][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:27 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:27 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:28 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x30a, 0x0) 15:24:28 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:28 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:28 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3, 0x4000}, 0x1c) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x208000, 0x0) ioctl$VIDIOC_CREATE_BUFS(r1, 0xc100565c, &(0x7f00000001c0)={0x2, 0x6, 0x2, {0x0, @pix_mp={0x4, 0x40, 0x30314742, 0xc6471e331ae6ca1, 0x0, [{0x8, 0x1}, {0x2, 0x2}, {0xfffffff8, 0x5}, {0x2, 0x7}, {0xffff, 0x6}, {0x8, 0x20}, {0x3ff, 0x401}, {0xffffffff, 0x200}], 0x1, 0x20, 0x2, 0x1, 0x7}}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) mkdir(&(0x7f00000016c0)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x4040, 0x0) creat(&(0x7f0000002500)='./file0/bus\x00', 0xcebb6074bb566d03) r2 = open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) fcntl$lock(r2, 0x26, &(0x7f0000000040)) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, r2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/mixer\x00', 0x0, 0x0) r7 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0xc8, 0x81000) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000000800), 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="01263247", @ANYRES32=0x0], &(0x7f00000000c0)=0xfe10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r8, 0x84, 0x7a, &(0x7f0000000100)={r9}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f0000000400)={0x7f, 0x80, 0x0, 0x10001, 0x200, 0x5c, 0x8, 0x8, r9}, &(0x7f0000000540)=0x20) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0x9, &(0x7f0000000500)={r9, @in={{0x2, 0x4e23, @multicast2}}, 0x36, 0x4, 0x8, 0x7, 0x9}, &(0x7f00000005c0)=0x98) r10 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r10, 0x110, 0x3) connect$rxrpc(r10, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r10, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000100100000140000077001c235723b99c824246630e246162cc7c27a57c86dd1e0d41934a20f9d20e6bec49e8f02f93cf5a324a92b0c48a6a0736d1b450d16cc18f8947e64608572b8bbabf40b9d4208d51a6e2ac6ad4661555adc6ace86d8ab9"], 0x18}}], 0x1, 0x4048000) close(r10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) 15:24:28 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:28 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x30b, 0x0) 15:24:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:28 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x30c, 0x0) 15:24:28 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) [ 625.953971][ T26] kauditd_printk_skb: 82 callbacks suppressed [ 625.953986][ T26] audit: type=1804 audit(1569338668.254:46): pid=27212 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir242365622/syzkaller.asnPyY/418/file0/bus" dev="ramfs" ino=96933 res=1 15:24:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:28 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) [ 626.021759][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 626.027544][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:28 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xf9fdffff00000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:29 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xff00000000000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x30d, 0x0) 15:24:29 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:29 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="3e965b3e4a610bca"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x90c) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) r7 = socket(0x2000000000000021, 0x2, 0x10000000000002) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VIDIOC_LOG_STATUS(r10, 0x5646, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r7, 0x110, 0x3) r11 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x22, 0x111001) ioctl$sock_inet6_SIOCSIFADDR(r11, 0x8916, &(0x7f00000001c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1b, r5}) connect$rxrpc(r7, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r7, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r7) r12 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r12, 0x110, 0x3) connect$rxrpc(r12, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r12, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000442da147e7d633e381"], 0x18}}], 0x1, 0x4048000) close(r12) write$RDMA_USER_CM_CMD_BIND(r3, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x30, 0x0, @ib={0x1b, 0x80, 0x7fffffff, {"752e44f25b9185b6ae9adebf0d43c8bf"}, 0x2, 0x7, 0x6}}}, 0x90) setsockopt$packet_int(r3, 0x107, 0x14, &(0x7f0000000180)=0x40015b5, 0x3) 15:24:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:29 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x30e, 0x0) 15:24:29 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:29 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x30f, 0x0) [ 627.061758][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 627.067573][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:29 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:29 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x310, 0x0) 15:24:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 627.292299][T27290] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 627.363107][T27290] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 627.441292][T27290] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 627.473495][T27290] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 15:24:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r9}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000240)={0x0, 0x243, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x40, 0x24, 0x507, 0x0, 0x0, {0x0, r9, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x24, 0x24, 0x627, 0x0, 0x0, {0x0, r9, {0x0, 0xfff2}, {0xffff, 0xffff}}}, 0x24}}, 0x0) sendmmsg(r4, &(0x7f00000023c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)="c919072ed8ae0aeed11783ef81822296add238fdb2c2970b83a5f033448fd43efab0d68a309a880f74925f96448d1244165b88d5b7dc6dc85085ff7f739e2bb10f3867e4ce0edeff162be79c4ea3a36904ce393587ad0c91359df234a25ff94fb9ec385676537853f48a9d1b034bd93a8ebb445669e1e1ae44c97cbde9e85d3fe4b940e42c19a9295daa441700b6549d3c03fd63ebffc307139efa8c"}]}}, {{&(0x7f00000004c0)=@xdp={0x2c, 0x4, r9, 0x28}, 0x122, &(0x7f0000001b00)=[{&(0x7f0000000540)="efc850747617285e1f987bca5a51098cf8e2f1dac03cd60f33a934e280953c6e3a7c16e9925060abaa7595ff4f6a6ee15cd6d16dab21216f65509eba840d4409242c894201eb1b94646bd3232c5fc6138594fa349cec2807e9b0b5f84d2d72c83416ac10509ff99cc2e5307be8769d856723fce4b8ee001cbef2d19bfcde363a701641281ad4a8c4177df6c1262526de29b5538b109df778e9334669fd696e090de74c8fba9070e10c7c27a789427872612a3ed35b8baf8d7f3afc47f29ca11bf9cb1038e36c671fe5b97b96252b12df584b1416243a0977b4c355086f31bca2d2c4231aaadfa7d2a8f7"}, {&(0x7f0000000280)="7c119b39471b9be654323dfa7e9b695cdaa3d44398692780beac068c0a44ea1659133a"}, {&(0x7f0000000640)="81ecfccb8d9a4c585b9b5450d3af65ddc431f3996b2f8e7801276ced1233de4f5bae7da9f6ef45c713a118d755ca50e9f4c5c7cb20226300ba7311359570ec7166ab44da543bba0c52cd774f2540afcc6f1b904437c4fa54c1021a5586af63d81f8d75c32a24016dcccce1d2a99681e58ac01d4bfa54d15f5b46ebc7afb0c67694a013b0eb3fb4f539599e717181d6511fde8c4305"}, {&(0x7f0000000700)="05c3105350fd537ad358f381a3e1c5fe7b159e62d2f68f1d4d20e1e89cf73d00169c4ed2151ee609e04ec38ced5947a4760baf460c3552653a03bef4e47f756c04744322469ea14ad4fd974cfbc0eec261f9d617b134ff5aaf2a4610a53be45dae10d0595f3b2b175cad61720576f6bccda652108384f747d36f8ed372e9ddc312d63bf23c1086a0739786a20a548bcc178c95a9352520bc4a9ba26d4f75346660360a6a5bb583ec32044cae2db89d8cc2ca35fc255ec161e77ed3a2f9ecb78566a4d704480832898dacf19f77e0f9dcd4563e899002c54c6b6fed216ea0ba01bc363bc32e7f67ee90ace28db14bf28ce368"}, {&(0x7f0000000800)="db3909787fbca7145613d8219920b1f7067c0aed0c07932cb51790403235d88767a963ca73528f44881241e6f2b323caf6f274d53c20fea68fc8d8fdf5d388432b5f0e23b4f788a46b5008cb9b318d70c288de75d7fb37dd18c5de696ee34c302eeb3105646e795877e7954ca3714879db73d3b53adad48fe0372c4f4bb2ec532a4b64fbc8148158bff28de1f9b93169ce980e6b0e790687353fe5324492ddc50033a04b533e594a0279cef0949d30e27d40bba39fcddf68cd109dc23adadeadf31faa6cf0b0533a37fc87a31bde6f8190f4434de449613d46441220bbf5aab3ade5f6bb80455dcf0659fa04"}, {&(0x7f0000000900)="bc6e5221fbe818e410b367cda3d50d918e7f695bb4587702b0144cadfff49e2065d84da0b4bd5a10e3cf6266a698e945f2a6d3ec267d503f582709d8925b88bb87eb3fc9f040367cb446f6de0dc8c45d"}, {&(0x7f0000000980)="7d35f3871b5277ef241fe9bc833809a2f3ae3665e2c858608a62690da30f4713a8bd021b0098750acba179c1334983a9be8af8e6125a1e7562abea06443f08f9c1f3972376cbcde04ec89e1dc70a39342bb3bf5502db9f6368989040c667bb34d2112a025d86fda1445a7566d97c674b089ee29f3a1938c5dac7c6ab4f65e2d7f0e5eaaf731b4d2bbeae93943919d90b7c57ce62b6c931f3ca2ef52c61f478d8c7b2dcb8bb4a1a0957e95bae31ba394e598e422350b25ad3708799ea7976dc2b9cbc9d5568594519c703ad3f6846116b9b5f0106a4ba4da10e7734"}, {&(0x7f0000000a80)="2739351e885f53fc9a54c90a7d9d314d24306199181dc8205104de2ed1e419be4d38aa38de61a41d6e47b314488bf3dd203a6c2a178038674403d28daadda85f72121a736ade7938db318223821b05aa8b5200b4c49548b6b0064afed652499af3e77432dc882b9b6d5f5c555e0ed03a327dcefd1495ca0694a6de439c26"}, {&(0x7f0000000b00)="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"}]}}, {{&(0x7f0000001bc0)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm-aes-ce\x00'}, 0x0, &(0x7f0000002200)=[{&(0x7f0000001c40)="aa393200749907ea4bc919d9f77e38daf942b56b4cf22a13ae8a5effd001101962c40c04fed04ffc78b7aad35d2a73b2dded"}, {&(0x7f0000001c80)="2af71574e3c50026631a19184e40fa2144ef46749d4a52997982002d62daaaee577795f9a743f97c466e404c03829f1c34f8f9f2dc680bd4bbc2a6f9c2466a6471dc6c6d408dff5b538ffa7da12dcfcf6d01f01ec8aaf13dc5b1a6a8a69a7cae6b4149384626f5e34bb200b43b7292893ab7495abc0c17daf386c6bdecd81c700d7204be6d02d75142dd2304ac54b88341a62bcf1dd611b9c0438c2b02f17fdc0f4b95705c437a6a55de18ca0598d5066e6eb44faa5384c572"}, {&(0x7f0000001d40)="d942d0750722257bb8858ebdfd9699eb4357a29f7f57a1af06d6daf313ea91df4d7ef78d469f1174ee44496d3fbf0bad431aaf2aeedcf67f9af972ba997d9bed8f8ed332dbd3213aed6a7ff5088920bbaff54ac56459f476dcef4e4f8288c007220bf77840e12f68ca1165b1d2d1a4efb8face33157c0d5ca559254b4b42747bf7fee34030401581ff47a17f72f5519259d3c88f3a048d9351e0f1e0f9bd9143cb7be4a1dde7d5a330b90dcf0b1aae690e9278faecaf190395dcfb5be52c5fb020a1e8d7dce7ec50662c259c104daed1a6547c328845856f0d8ce05a6315fa2b273801d378a6a36bd2dfe6"}, {&(0x7f0000001e40)="60117b653ee8e5fc422ffdceeaacebb7776685ecdbd795a492ccb5d6cbc5cdfa28331d3fe41ff7b74123ed02471f71a7c0cce5e91105e5637d0b8e6231d4645974f8ad755eedff49758006740b8a16306fb051c91ee3c952fa48d4a081"}, {&(0x7f0000001ec0)="5fa0d2682c4afd0174996212d1d31615210cb1a5720cd303d2ad60811077f7b432f93a227f907f2b2df882a408e4eaadcbe7a42447c05d282b97baa429275c65a53987fcfdb3902cb9cd2cd2a5ccf224d23fe0508cf2874f797058520754fa13d5e084c59d2890245c72ee825387520c471043b981cf7282a8c1478e5941c926796332c0be1dcfd6d9c8b97201e15fb646711811b8ee0ff5b3c6fd0ce734e95d939b58f6086ed468c56c16c31cacfeb90506abf814a92a2e348956f3b2365eeb6cb3d81776168edeff4fd9ccb0be4b94b7150b39b0f291fb76ae26c5538afc94ab6d209e6d52ac11329ae19f1bf118f18477ea"}, {&(0x7f0000001fc0)="3994bad2c481de61692ffb754827cf8c527ea2a59c5866f39b59de38e2a3dd346c227d2d1ff0d0ce69b00164645444f16474b2d8843b74236189947f7731b0c63090a01b3dcb1148a3f55a0e01544e359c54a8c6912c5fc2a5f85234c75a2ed987b267a737acc8ad5613e081342a"}, {&(0x7f0000002040)="7cc5565fa7a189dcba1af7eb7b3dde0abf8d278453342559f7fbff0b11ec964c7fde4d1b6ddaa5833ea170611500ee5ee558d9105af173d6b049a044e1a1f3f29c8805a6eeede1f17ba15e16"}, {&(0x7f00000020c0)="56a90cf525249328c7ac22139924f300584432ca66514e9762be9b8c55c1ef52fd7a2f657cff69c00bfa655e69886c3938176a843a0720b69ff7bfd2a52171e5f9507d057ac8ec2e4e790300dc2815376a7cc4b8a0ae2dca18e195806224fe6430e54a587c671e33edc38dfb78c7c2d4ecae466b2f67104175297ce64e765a2a55e17f413ab510d97dd68241f5d61faf10a611a68f4956287913a5acd71f371888979c7c66123ce9b60498259cf4a52cdafc4bc9b9087fdec377209226a637e9f41e2a26d76f1e993e0fb454196a0cbc0937b80fcb8c371ed324dea02352d24abf771698f1"}, {&(0x7f00000021c0)="0a2977286d5ec9911a18b284abb526e498a9ef29f0d1d428426c0ce157ad42e7f4c75b2524b365280ab21cfa7878abe5350ebd66cd1b"}, {&(0x7f0000003240)="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"}], 0x0, &(0x7f00000022c0)=[{0x0, 0x116, 0x6, "8327a32cb0c65d406fe17956074aeeed4d6e7993fb607f371eaa24da43c74c7186c899aace3f8a640e84f6c2a50d04e6e79c3a00a10d2e3e47d81850681322b3363a8abf03007659a077908a289be5e85de0e61b6ad900f02d9d3b0a6ecbdc0053010b411cce42f012b6bc980b013890297adcae3b6c70fa9c917f48f2df0903db543f9a7753d47dd8004fe115fb715d11ad44b3fd028b665cf5423d9994beff042b2a5ac89515673024e7c6ffdc8a2f4e4e8dbc753fb0f963a4c133d8361faca44a24"}]}}], 0x40000d8, 0x4048000) r10 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r10, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=ANY=[@ANYBLOB="0863044000000000"], 0x0, 0x0, 0x0}) syncfs(r10) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r11 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r11, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) socket$inet_udp(0x2, 0x2, 0x0) 15:24:30 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x311, 0x0) 15:24:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:30 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x312, 0x0) [ 627.962659][T27311] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 628.031790][T27311] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 15:24:30 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:30 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x313, 0x0) 15:24:30 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x0) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) [ 628.101761][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 628.107683][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:30 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) [ 628.188457][T27311] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 628.256339][T27311] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 15:24:31 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=[@decrefs], 0x0, 0x0, 0x0}) r6 = accept4$x25(r3, &(0x7f00000000c0), &(0x7f00000001c0)=0x12, 0xc0000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000200)=[r5, r1, r6], 0x3) r7 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r7, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x1c, &(0x7f0000000180)=0x40001, 0x2b6) 15:24:31 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:31 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x314, 0x0) 15:24:31 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(0x0, &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:31 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x315, 0x0) [ 628.912926][T27352] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 15:24:31 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(0x0, &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:31 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:31 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 629.141766][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 629.147593][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:32 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x7, 0x7543f9fd2513646e) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f00000001c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r5, 0x110, 0x3) connect$rxrpc(r5, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r5, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r5) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:32 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x316, 0x0) 15:24:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:32 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(0x0, &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:32 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:32 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x317, 0x0) 15:24:32 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:32 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:32 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:32 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) [ 630.181768][ C1] net_ratelimit: 8 callbacks suppressed [ 630.181775][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 630.193123][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) r5 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x5, 0x20000) ioctl$IMADDTIMER(r5, 0x80044940, &(0x7f00000001c0)=0x14) syz_init_net_socket$x25(0x9, 0x5, 0x0) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:33 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x318, 0x0) 15:24:33 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:33 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:33 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x319, 0x0) 15:24:33 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x14e79c7a7783c9bd, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:33 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0xa, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:33 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x31a, 0x0) [ 630.968295][T27459] __ntfs_warning: 19 callbacks suppressed [ 630.968309][T27459] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 631.030957][T27459] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 631.100882][T27459] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 631.141794][T27459] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 631.221764][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 631.227554][ C1] protocol 88fb is buggy, dev hsr_slave_1 15:24:33 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x800000007}, 0x1c) sendmmsg(r5, &(0x7f0000000100), 0x5bd, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='hsr0\x00', 0x10) r6 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r6, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) memfd_create(&(0x7f00000001c0)=')}\x00', 0x0) 15:24:33 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:33 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x10, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:33 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:33 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x31b, 0x0) 15:24:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x31c, 0x0) [ 631.660897][T27478] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 631.692358][T27478] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 15:24:34 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x31d, 0x0) 15:24:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 631.843059][T27478] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 631.902915][T27478] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 631.941766][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 631.947655][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 631.953427][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 631.959152][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 631.964900][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 631.970622][ C0] protocol 88fb is buggy, dev hsr_slave_1 15:24:34 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0\x00', &(0x7f00000031c0)=ANY=[@ANYBLOB="4b000000080000000500000001040000480000001f000000000000000100000081000000010000808f0700000800000066f9ffff8100000093a1b00f0100000003000000090000000080000001000000050000007100000001"]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x2000000000000021, 0x2, 0x10000000000002) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) connect$rxrpc(r4, &(0x7f0000000040)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @rand_addr="de0e400ef3e8c5eddde35efbf130dcc1"}}, 0x24) sendmmsg(r4, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000001001000001000000770000f200000000"], 0x18}}], 0x1, 0x4048000) close(r4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@loopback, @in=@empty}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000380)=0x650) write$9p(0xffffffffffffffff, &(0x7f00000002c0)="3c04e7d654e048291d20b4435fa4b748e97944c4b4a3c4812c7c410a73c273aa02f24607b298db3dbd3f274c07a586e69f9f4445e80f70146b928ddb68c04e9c1681f2c0fb4f7c223fab81a6ede440a9f218dec841f8d71f8c4c1264b6c683d8f852963ba5acdf6a8760b13e142baaa0b4e6033b78a006a9763f4db93ea356147d0b71d86e0fbd14", 0x88) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x0, 0x29021) write$evdev(r5, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_IRQ_LINE(r7, 0x4008ae61, 0x0) ioctl$KVM_HYPERV_EVENTFD(r7, 0x4018aebd, &(0x7f00000000c0)={0x0, r3, 0x1}) setsockopt$packet_int(r0, 0x107, 0x13, &(0x7f0000000180), 0x4) 15:24:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:34 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x48, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:34 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x31e, 0x0) 15:24:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) [ 632.482001][T27513] ntfs: (device loop1): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 15:24:34 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x31f, 0x0) 15:24:34 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) [ 632.535123][T27513] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 15:24:34 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:34 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:35 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x4c, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:35 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000140)={@rand_addr="873edfc4089bc0ac2d82e46bf191d783"}) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x29) bind$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000100)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r3, 0x0, 0x19404, 0x0) 15:24:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x320, 0x0) 15:24:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:35 executing program 4: mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r1, 0x5412, 0x711000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) r3 = syz_open_dev$admmidi(&(0x7f00000003c0)='/dev/admmidi#\x00', 0x8, 0x100000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bf, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x220, 0x0, @perf_config_ext, 0x0, 0x3}, r2, 0xffffffffffffffff, r3, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000180)='./file0\x00', r5}, 0x10) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(r6, &(0x7f0000000300)='./file0\x00', 0x0, 0x2, 0x0) getpid() kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r4) sendfile(0xffffffffffffffff, r4, 0x0, 0x8) pivot_root(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00') ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1}) fcntl$getown(0xffffffffffffffff, 0x9) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r7, 0x5423, &(0x7f00000001c0)=0x2) ioctl$TCFLSH(r7, 0x5412, 0x711000) syz_open_pts(r7, 0x480001) capget(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)={0x80000001, 0x1, 0x8000, 0x3, 0x0, 0x44}) sendmsg$nl_netfilter(r0, &(0x7f0000000600)={&(0x7f0000000280), 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="f40000000203000426bd7000fcdbdf250000000304007400dc000400ac7ca5ecc291dabf2d875948e43e92de1806ac0aa12e3d151ac2b3b6cd77feed2e8d0307b7a37b0037ec4979420d3bf91ae67685267a57eeb1dd3acc71e48acb5c0ac672a5b3db34d8d843ffffffffcc400d780f8fc17edc3488af20d448fe17bbdd41cc9dead507e6eae356e4507e1b59208f1ce975da4bd3c93ccbe7749182136557229cbaa70a8b93f238d7889844b916d805a25fede39a8a3587d33720f93564f17f7f51ac53445c1780ff0c93bd0f01e3ad6992fd46a0e66c7941268991696974558a631df17c8273b94168cc23dc3cc58989ece751"], 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4040d) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x86a40, 0x0) write$P9_RGETATTR(r8, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="24000000210005ff006b000421ed382002190008000000000010ffea08000100", 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff96) setresuid(0x0, r10, 0x0) mq_open(&(0x7f0000000640)='md5sumeth1wlan0{cgroupmime_ype@\x00\x1c\xf27;\xcesf\x00\x00\x00\x00\x80\x00\x00\x00\x89\xa3\xa6\xc4\x19\x9e\xb3q\xdbZ\x0es\xee\xc6\xc8\v\x00\x00\x00\x00\x00\x00d\xb9\xfcB\xe4\xdb\xa7\xae\x88\x03\x88\xc0\xebdE`\xaf\bu\x02\xab\xe1\xd2AR\xbf\x8c{\x1d\x01(\r\xb6\xb6\x8b\xb0\n\xd4\xed\xaf\xab\xb3\xd2K\t}$\x98\xffC\xba\x90\x8e\xe5uk\xb8\xf8\n3l4\xff\xd54M\xaf\x8e3\xc2\\D\xfc/\xe5\x96\x05\xbd\xad\x9c\xb2H\x9c\xd9\x9a$\x80\x1c\f[\xae\xbd;\xe4\x9ezw\x92\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) 15:24:35 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000380)='btrfs\x00', &(0x7f00000003c0)='./bus\x00', 0x0, 0x1, &(0x7f0000000640)=[{&(0x7f0000000400)}], 0x0, &(0x7f0000000680)={[{@degraded='degraded'}, {@noinode_cache='noinode_cache'}, {@device={'device', 0x3d, './file0'}}]}) open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, r0) 15:24:35 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x68, &(0x7f0000000600)={[{@utf8='utf8', 0x3d}]}) 15:24:35 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmmsg$inet(r0, &(0x7f0000009140)=[{{&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="7aff", 0x2}], 0x1}}, {{&(0x7f00000003c0)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @rand_addr, @remote}}}], 0x20}}], 0x2, 0x0) 15:24:35 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='statm\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r0, &(0x7f00000017c0), 0x321, 0x0) [ 633.379094][T27573] ------------[ cut here ]------------ [ 633.384623][T27573] mismatching kcsan_end_atomic() [ 633.384748][T27573] WARNING: CPU: 1 PID: 27573 at kernel/kcsan/core.c:264 kcsan_end_atomic+0x60/0xd0 [ 633.399021][T27573] Kernel panic - not syncing: panic_on_warn set ... [ 633.405608][T27573] CPU: 1 PID: 27573 Comm: syz-executor.5 Not tainted 5.3.0+ #0 [ 633.413138][T27573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 633.423182][T27573] Call Trace: [ 633.426475][T27573] dump_stack+0xf5/0x159 [ 633.430722][T27573] panic+0x209/0x639 [ 633.434626][T27573] ? kcsan_end_atomic+0x60/0xd0 [ 633.439477][T27573] __warn.cold+0x4c/0x4d [ 633.443718][T27573] ? kcsan_end_atomic+0x60/0xd0 [ 633.448564][T27573] report_bug+0x1cf/0x1e0 [ 633.452896][T27573] do_error_trap+0xda/0x140 [ 633.457397][T27573] do_invalid_op+0x43/0x60 [ 633.461810][T27573] ? kcsan_end_atomic+0x60/0xd0 [ 633.466916][T27573] invalid_op+0x1e/0x30 [ 633.471066][T27573] RIP: 0010:kcsan_end_atomic+0x60/0xd0 [ 633.476522][T27573] Code: 89 e5 74 77 65 ff 05 1f 90 af 7e 65 8b 05 b0 90 ae 7e a9 00 01 1f 00 75 77 e8 cc fe ff ff 48 c7 c7 70 34 60 85 e8 78 1c db ff <0f> 0b e8 09 ff ff ff 5d c3 a9 00 01 1f 00 75 14 65 48 8b 04 25 40 [ 633.496121][T27573] RSP: 0018:ffffc90000e7b380 EFLAGS: 00010282 [ 633.502179][T27573] RAX: 0000000000000000 RBX: ffff8880a992c000 RCX: ffffc90012da2000 [ 633.510144][T27573] RDX: 000000000000687e RSI: ffffffff81388b3d RDI: 0000000000000006 [ 633.518108][T27573] RBP: ffffc90000e7b380 R08: ffff888120e49000 R09: 000000000000001e [ 633.526073][T27573] R10: 0000000000000003 R11: 0000000000000000 R12: 0000000000000026 [ 633.534261][T27573] R13: ffff8880abdd2600 R14: ffff8880a992c0bc R15: ffffe8ffffd571d0 [ 633.542247][T27573] ? vprintk_func+0x8d/0x140 [ 633.547285][T27573] __dev_queue_xmit+0x175f/0x1b80 [ 633.552303][T27573] ? __tsan_write8+0x18/0x40 [ 633.556893][T27573] ? __neigh_event_send+0x970/0x970 [ 633.562207][T27573] ? __tsan_write_range+0x18/0x40 [ 633.567238][T27573] dev_queue_xmit+0x21/0x30 [ 633.571739][T27573] neigh_resolve_output+0x44a/0x470 [ 633.576946][T27573] ip_finish_output2+0x4a9/0xe30 [ 633.581876][T27573] ? ip_send_check+0x85/0x90 [ 633.586467][T27573] ip_do_fragment+0x52e/0xda0 [ 633.591145][T27573] ? ip_append_data.part.0+0x140/0x140 [ 633.596693][T27573] ? nf_ct_deliver_cached_events+0xba/0x2a0 [ 633.602591][T27573] ip_fragment.constprop.0+0xd8/0x160 [ 633.607963][T27573] __ip_finish_output+0x2f8/0x490 [ 633.612996][T27573] ? ipv4_confirm+0xdc/0x160 [ 633.617588][T27573] ip_finish_output+0x41/0x160 [ 633.622356][T27573] ip_mc_output+0x143/0x620 [ 633.626971][T27573] ? __ip_finish_output+0x490/0x490 [ 633.632168][T27573] ip_local_out+0x74/0x90 [ 633.636495][T27573] ip_send_skb+0x35/0xb0 [ 633.640738][T27573] ip_push_pending_frames+0x5b/0x80 [ 633.645954][T27573] raw_sendmsg+0xe7d/0x1cd0 [ 633.650476][T27573] ? __tsan_write2+0x18/0x40 [ 633.655071][T27573] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 633.661326][T27573] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 633.667046][T27573] ? __tsan_read8+0x15/0x30 [ 633.671545][T27573] ? aa_sk_perm+0x1a4/0x450 [ 633.676050][T27573] ? __tsan_read2+0x15/0x30 [ 633.680551][T27573] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 633.686791][T27573] inet_sendmsg+0x6d/0x90 [ 633.691117][T27573] ? inet_sendmsg+0x6d/0x90 [ 633.695632][T27573] ? inet_send_prepare+0x200/0x200 [ 633.700780][T27573] sock_sendmsg+0x9f/0xc0 [ 633.705105][T27573] kernel_sendmsg+0x4d/0x70 [ 633.709607][T27573] sock_no_sendpage+0xda/0x110 [ 633.714376][T27573] inet_sendpage+0xe7/0x100 [ 633.718882][T27573] kernel_sendpage+0x7b/0xc0 [ 633.723468][T27573] ? inet_sendmsg+0x90/0x90 [ 633.727970][T27573] sock_sendpage+0x6c/0x90 [ 633.732384][T27573] ? kernel_sendpage+0xc0/0xc0 [ 633.737145][T27573] pipe_to_sendpage+0x102/0x180 [ 633.741997][T27573] __splice_from_pipe+0x248/0x480 [ 633.747020][T27573] ? direct_splice_actor+0xc0/0xc0 [ 633.752132][T27573] splice_from_pipe+0xbb/0x100 [ 633.756895][T27573] ? direct_splice_actor+0xc0/0xc0 [ 633.762012][T27573] generic_splice_sendpage+0x45/0x60 [ 633.767378][T27573] ? splice_from_pipe+0x100/0x100 [ 633.772406][T27573] do_splice+0x497/0xbe0 [ 633.776657][T27573] __x64_sys_splice+0x20a/0x220 [ 633.781686][T27573] do_syscall_64+0xcf/0x2f0 [ 633.786195][T27573] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 633.792083][T27573] RIP: 0033:0x459a29 [ 633.795977][T27573] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 633.815578][T27573] RSP: 002b:00007fa9e0734c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 633.823995][T27573] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 0000000000459a29 [ 633.831966][T27573] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000003 [ 633.839940][T27573] RBP: 000000000075bfc8 R08: 0000000000019404 R09: 0000000000000000 [ 633.847912][T27573] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa9e07356d4 [ 633.855877][T27573] R13: 00000000004c9222 R14: 00000000004df820 R15: 00000000ffffffff [ 633.865260][T27573] Kernel Offset: disabled [ 633.869590][T27573] Rebooting in 86400 seconds..