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"}]}, 0xec4}}, 0x0) 21:45:35 executing program 5: add_key(&(0x7f0000000280)='.dead\x00', 0x0, 0x0, 0x0, 0x0) 21:45:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x40000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmsg$inet6(r0, &(0x7f0000001400)={&(0x7f0000000000)={0xa, 0x0, 0x10000, @loopback}, 0x1c, &(0x7f0000001300)=[{&(0x7f0000000040)="06", 0x1}], 0x1}, 0x0) 21:45:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)={0xec4, 0x1, 0x3, 0x301, 0x0, 0x0, {}, [@NFQA_PAYLOAD={0xead, 0xa, "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"}]}, 0xec4}}, 0x0) 21:45:35 executing program 5: keyctl$reject(0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff8) 21:45:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)={0xec4, 0x1, 0x3, 0x301, 0x0, 0x0, {}, [@NFQA_PAYLOAD={0xead, 0xa, "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"}]}, 0xec4}}, 0x0) 21:45:35 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x2000001c) 21:45:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x17, &(0x7f00000001c0)=0x80, 0x4) 21:45:36 executing program 2: add_key$keyring(&(0x7f0000000240), 0x0, 0x0, 0x0, 0xfffffffffffffff8) 21:45:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x48000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:36 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000400)={0x18, 0x1, 0x1, 0x801, 0x0, 0x0, {}, [@CTA_TUPLE_REPLY={0x4}]}, 0x18}}, 0x0) 21:45:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x88030000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:36 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000380)=ANY=[@ANYBLOB="8822"], 0x118) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000700), 0x8) 21:45:36 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0x4, 0x4) 21:45:36 executing program 0: r0 = socket$inet(0x2, 0x3, 0x8) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000001c0)={@loopback, @broadcast}, 0x8) 21:45:36 executing program 3: rt_tgsigqueueinfo(0xffffffffffffffff, 0x0, 0x1f, &(0x7f0000000000)={0x0, 0x0, 0x3}) 21:45:36 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000000)={0x40}, 0x0) 21:45:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:36 executing program 5: r0 = gettid() process_vm_readv(r0, &(0x7f0000000140)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/182, 0xb6}], 0x3, &(0x7f0000000180)=[{&(0x7f0000000540)=""/4096, 0x1000}], 0x1, 0x0) 21:45:36 executing program 0: process_vm_readv(0x0, &(0x7f00000002c0)=[{&(0x7f00000013c0)=""/102400, 0x19000}], 0x1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/81, 0x51}, {0x0}], 0x2, 0x0) 21:45:36 executing program 3: syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000440)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)) 21:45:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x55260000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x14, &(0x7f0000000000), 0x8) 21:45:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x89030000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:37 executing program 2: socketpair(0x2c, 0x803, 0x0, &(0x7f0000000400)) 21:45:37 executing program 0: fanotify_mark(0xffffffffffffffff, 0x65, 0x80000001, 0xffffffffffffff9c, 0x0) 21:45:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000100)={'batadv_slave_1\x00'}) 21:45:37 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 21:45:37 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x55aaffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8a030000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000380)=@gettaction={0x14, 0x32, 0x1}, 0x14}}, 0x0) 21:45:37 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x10, &(0x7f0000000000), 0x4) 21:45:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0xc, &(0x7f0000000000), 0x8) 21:45:37 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x60220000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:37 executing program 2: clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, r0+10000000}, &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) 21:45:37 executing program 3: keyctl$reject(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff8) 21:45:37 executing program 0: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10001, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="5d68262fdf210934d1de3a9434631cfd", 0x10, 0x6}], 0x0, &(0x7f0000000180)) 21:45:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x2, 0x9, 0x8}, 0x20) 21:45:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_inet6_SIOCDELRT(r0, 0x890b, &(0x7f0000000000)={@empty, @loopback, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc56c01a9}) 21:45:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x2, 0x9, 0x8}, 0x20) 21:45:37 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x15, 0x0, 0x0) [ 645.473043] FAT-fs (loop0): bogus logical sector size 2337 [ 645.493975] FAT-fs (loop0): Can't find a valid FAT filesystem [ 645.587914] FAT-fs (loop0): bogus logical sector size 2337 [ 645.597122] FAT-fs (loop0): Can't find a valid FAT filesystem 21:45:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8b030000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:38 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x2000, &(0x7f00000015c0)) 21:45:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x2, 0x9, 0x8}, 0x20) 21:45:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x68000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000), 0x4) 21:45:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x14, 0x0, 0x0) 21:45:38 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)=@FILEID_INO32_GEN_PARENT={0x10}, 0x0, 0x0) 21:45:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x2, 0x9, 0x8}, 0x20) 21:45:38 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) socketpair(0x28, 0x0, 0x6, &(0x7f0000000140)) 21:45:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:38 executing program 2: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f0000001380)=[{0x0}], 0x0, 0x0) fork() prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) 21:45:38 executing program 5: r0 = fork() accept$alg(0xffffffffffffffff, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) rt_tgsigqueueinfo(r0, 0x0, 0x35, &(0x7f0000000140)={0x1f, 0x8, 0xfffff000}) 21:45:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8c270000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:38 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000240)) 21:45:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0xe9, 0x6, 0x120}, 0x40) 21:45:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x74000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:38 executing program 5: socket(0x10, 0x3, 0x7fff) 21:45:38 executing program 2: keyctl$reject(0x14, 0x0, 0x0, 0x0, 0xfffffffffffffff8) 21:45:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f00000018c0)=[{{&(0x7f0000000040)={0x2, 0x4e22, @remote}, 0x10, 0x0}}, {{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f00000001c0)="5c3c4a3a6d66b429f0ff8671b1653cae403cafd1fdfcf18bf0e3200b3ef9260b93a9a9d377cbdf49c170aadbed90a7ffd8d0e7b9942fe0fea0e96c0d532f37fc15c4c5742b37eff0d927bd2c", 0x4c}, {&(0x7f0000000240)="e26eb57597b515299e1253544d48f9c9ba5efbcd1a515eebd84beee4ac27c5e9fd87543d8b7e0cfcd8bba070510601986eb62990ed50121b42b9ef1ad555ebed44f6d3364b732242f69eb24642de191acceaff2257", 0x55}, {&(0x7f00000002c0)="d85bd25dcc1a32c70f74fd4772ab6d047671d00bf2938818436df22e7eb679faa254dccf969a7ef9d45551b4587b280076daa10c6f5c490e1bfd2f413759359e273b06f8d1500077479cd7a40a7ddaa6dc0f31", 0x53}, {&(0x7f0000000340)="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", 0xf0c}], 0x4}}, {{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000001480)='i', 0x1}], 0x1}}], 0x3, 0x8004) 21:45:38 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f0000000440)='t', 0x1, 0x6}, {&(0x7f0000000500)="f0", 0x1}, {0x0}], 0x0, 0x0) 21:45:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050000000000000000000555b6f2a0"], 0x20}}, 0x0) 21:45:38 executing program 0: sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x0) 21:45:39 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:39 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x80002, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@t={0x0, 0x0, 0x0, 0x0, @generic=0x4}], 0x8) [ 646.626334] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 646.684260] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 21:45:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xd}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x6}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/current\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x1e, 0x0) 21:45:39 executing program 2: socketpair(0x0, 0xf, 0x0, 0x0) 21:45:39 executing program 3: syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f0000000340)="2b950003f0bba1604f803f72a4a4dc9751e9f93248a219c46b04b1a7e110ac95626665e5e936b139ef1a5eeeeec602a6ee3aef75e3380b425f1abb5eda8385dce2b2b57d1603acbc864d5e626c5eb2024c75dd1721f6f7d4946a56c743f81ee6e4def673f78bfb41db9e98c0ef8b9cc4ff757346d25f39570caf48eb228c1ad240ced2767ec9fed47787a5f8dcb0f2fd61ed51b088df6ec15add779916767e19b9edd3d798eed278caaaefa45540c91f39528f9f75d918d6f5669c93a5f7744af672665496654a6a381cb1d5b575063aefdf7f2c2b309446a532e7dee5b97745", 0xe0, 0xffffffff}, {&(0x7f0000000440)="742ce4c0c26f3aad721c0d4a5ab974463ad62ef8a03b5ad0f91841e7621be44314e57d0ac175560522168dec87f6be9d658640d2f1760f89072ddb5b41e174f472bcccaa1995f4c65b58730f99a4e95070b37a9800fc558b9fbdf4098f60d4b68eeead647d996842374a9e5668698c7a444d5e6f1119a83f9e886f7685f12113e1b7369d562c023fe8a6ff990779b7a97a5ba40c41fae00b3b3257fb29a262f410924c48438e703547cc790083b06cfca643cb0a2d51", 0xb6, 0x6}, {&(0x7f0000000500)="f07ac39766e4adaa83ada3f2baf75d5a5805d2346bb81620b51014d4e14d625dc591d2f4eff219661826816a23eb6ee21df0581de6b12b069ac16002fa1d", 0x3e, 0x5}], 0x40000, &(0x7f00000015c0)={[{@init_itable}, {@mblk_io_submit}, {@nodiscard}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@discard}, {@usrquota}, {@data_journal}], [{@euid_eq}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 21:45:39 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x80002, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@t={0x0, 0x0, 0x0, 0x0, @generic=0x4}], 0x8) 21:45:39 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x85030000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:39 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x80002, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@t={0x0, 0x0, 0x0, 0x0, @generic=0x4}], 0x8) 21:45:39 executing program 3: select(0x40, &(0x7f0000000240), &(0x7f00000002c0)={0x5}, 0x0, 0x0) 21:45:39 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001400)=ANY=[@ANYBLOB="4c000000130001"], 0x4c}}, 0x0) [ 646.984060] __ntfs_warning: 173 callbacks suppressed [ 646.984071] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid end of sector marker. [ 647.052020] ntfs: (device loop4): ntfs_attr_find(): Inode is corrupt. Run chkdsk. [ 647.085559] ntfs: (device loop4): ntfs_read_inode_mount(): Failed to lookup attribute list attribute. You should run chkdsk. 21:45:39 executing program 2: wait4(0x0, 0x0, 0x0, &(0x7f00000001c0)) 21:45:39 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x80002, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@t={0x0, 0x0, 0x0, 0x0, @generic=0x4}], 0x8) 21:45:39 executing program 3: syz_open_dev$ndb(&(0x7f0000000240), 0x0, 0x0) [ 647.184478] ntfs: (device loop4): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 647.208525] ntfs: (device loop4): ntfs_fill_super(): Failed to load essential metadata. [ 647.308646] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid end of sector marker. [ 647.334056] ntfs: (device loop4): ntfs_attr_find(): Inode is corrupt. Run chkdsk. [ 647.343948] ntfs: (device loop4): ntfs_read_inode_mount(): Failed to lookup attribute list attribute. You should run chkdsk. [ 647.371647] ntfs: (device loop4): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 647.383562] ntfs: (device loop4): ntfs_fill_super(): Failed to load essential metadata. 21:45:39 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c00000012000163"], 0x4c}}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r0) syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r0) [ 647.537465] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 647.546975] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 647.559297] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 647.621284] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. 21:45:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xd}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x6}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/current\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x1e, 0x0) 21:45:40 executing program 3: r0 = socket$nl_crypto(0x10, 0x3, 0x15) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ip6tnl0\x00'}) 21:45:40 executing program 2: recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f0000000340)="2b950003f0bba1604f803f72a4a4dc9751e9f93248a219c46b04b1a7e110ac95626665e5e936b139ef1a5eeeeec602a6ee3aef75e3380b425f1abb5eda8385dce2b2b57d1603acbc864d5e626c5eb2024c75dd1721f6f7d4946a56c743f81ee6e4def673f78bfb41db9e98c0ef8b9cc4ff757346d25f39570caf48eb228c1ad240ced2767ec9fed47787a5f8dcb0f2fd61ed51b088df6ec15add779916767e19b9edd3d798eed278caaaefa45540c91f39528f9f75d918d6f5669c93a5f7744af672665496654a6a381cb1d5b575063aefdf7f2c2b309446a532e7dee5b97745", 0xe0, 0xffffffff}, {&(0x7f0000000440)="742ce4c0c26f3aad721c0d4a5ab974463ad62ef8a03b5ad0f91841e7621be44314e57d0ac175560522168dec87f6be9d658640d2f1760f89072ddb5b41e174f472bcccaa1995f4c65b58730f99a4e95070b37a9800fc558b9fbdf4098f60d4b68eeead647d996842374a9e5668698c7a444d5e6f1119a83f9e886f7685f12113e1b7369d562c023fe8a6ff990779b7a97a5ba40c41fae00b3b3257fb29a262f410924c48438e703547cc790083b06cfca643cb0a2d51", 0xb6, 0x6}, {&(0x7f0000000540)="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", 0x1000, 0x1}], 0x40000, &(0x7f00000015c0)={[{@init_itable}, {@mblk_io_submit}, {@nodiscard}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@discard}, {@usrquota}, {@data_journal}], [{@euid_eq}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 21:45:40 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x87030000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:40 executing program 2: timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}}, 0x0) 21:45:40 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x88030000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:40 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@generic, @l={0x92, 0x0, 0x0, 0x2}], 0x9) 21:45:40 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x89030000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x14, 0x0, 0x200}, 0x14}}, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000040)=ANY=[@ANYBLOB="4c00000013000163"], 0x4c}}, 0x0) 21:45:40 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8a030000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 648.382698] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. [ 648.519799] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.0'. 21:45:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="4c00000012000163"], 0x4c}}, 0x0) [ 648.597801] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 648.606888] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 21:45:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xd}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x6}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/current\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x1e, 0x0) 21:45:41 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@e={0xff, 0xa, 0x0, 0x0, @generic}], 0x8) 21:45:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c000000730801"], 0x4c}}, 0x0) 21:45:41 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) 21:45:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9b270000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:41 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8b030000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:41 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}}, @redirect={0x5, 0x0, 0x0, @remote, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @broadcast}}}}}}, 0x0) 21:45:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000200)=""/106) 21:45:41 executing program 0: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read$FUSE(r0, &(0x7f00000063c0)={0x2020}, 0x2020) 21:45:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc) 21:45:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001400)={0x4c, 0x13, 0x1, 0x0, 0x0, {0x11, 0x0, 0x0, 0x0, {0x0, 0x4e21}}}, 0x4c}}, 0x0) 21:45:41 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x4c, 0x12, 0xb05}, 0x4c}}, 0x0) 21:45:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0xd}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x1, 0x0, 0x6}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/current\x00') preadv(r3, &(0x7f00000017c0), 0x375, 0x1e, 0x0) 21:45:42 executing program 3: syz_genetlink_get_family_id$batadv(&(0x7f0000006e80), 0xffffffffffffffff) 21:45:42 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8c030000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:42 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=ANY=[@ANYBLOB=' '], 0x28}}, 0x0) 21:45:42 executing program 2: socketpair(0x22, 0x0, 0x0, 0x0) 21:45:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb95cba3b, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:42 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000001540)=[{&(0x7f0000000340)="2b950003f0bba1604f803f72a4a4dc9751e9f93248a219c46b04b1a7e110ac95626665e5e936b139ef1a5eeeeec602a6ee3aef75e3380b425f1abb5eda8385dce2b2b57d1603acbc864d5e626c5eb2024c75dd17", 0x54, 0xffffffff}], 0x40000, 0x0) 21:45:42 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c00000012000163745d7cdf9050bf601d"], 0x4c}}, 0x0) 21:45:42 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:42 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000002900)={&(0x7f00000027c0), 0xc, &(0x7f00000028c0)={0x0}}, 0x0) 21:45:42 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080), 0x442, 0x0) ioctl$SNDCTL_FM_LOAD_INSTR(r0, 0x40285107) 21:45:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000006e80), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000006f80)={&(0x7f0000006e40), 0xc, &(0x7f0000006f40)={&(0x7f0000006ec0)={0x14, r1, 0x1}, 0x14}}, 0x0) 21:45:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:43 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x185000, 0x0) 21:45:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 21:45:43 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8d030000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:43 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) read$FUSE(r0, &(0x7f00000063c0)={0x2020}, 0x2020) 21:45:43 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000080)=[@l={0x92, 0x0, 0xe0}], 0x8) 21:45:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="4c00000012000163"], 0x4c}}, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) 21:45:43 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001400)={0x4c}, 0xfffffc36}}, 0x0) 21:45:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c0000001300014e6637b2d616a0e8cc302f8b250f371af8ca6f98f71b3bd558663be4c9587a7188050451bba478d44ff8bae0b861f09655285e651f4d6521446224d39957"], 0x4c}}, 0x0) 21:45:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 21:45:43 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{0x0}, {&(0x7f0000000440)='t', 0x1, 0x6}, {&(0x7f0000000500)="f0", 0x1}], 0x0, 0x0) 21:45:43 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x97ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:43 executing program 3: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000040)=ANY=[@ANYBLOB="42000000130001"], 0x4c}}, 0x0) 21:45:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 21:45:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$sock(r0, &(0x7f0000007f80)=[{{&(0x7f0000001880)=@pptp={0x18, 0x2, {0x0, @private}}, 0x80, 0x0}}], 0x1, 0x20000010) 21:45:43 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@s], 0x4) 21:45:43 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa8030000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:43 executing program 3: syz_emit_ethernet(0x11, &(0x7f0000000040)={@local, @dev, @void, {@llc={0x4, {@llc={0x0, 0x0, "c0"}}}}}, 0x0) 21:45:43 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000100)='X', 0x1, 0xffff}], 0x0, 0x0) 21:45:43 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@s], 0x4) 21:45:43 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb0270000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:43 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x1}, 0x1c}}, 0x0) 21:45:43 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfb]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') 21:45:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:44 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000080)=[@x={0x94, 0x0, '\x00\x00O\x00(J'}, @generic={0x80}], 0x51) 21:45:44 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@s], 0x4) 21:45:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000040)=ANY=[@ANYBLOB="4c00000013000163"], 0x4c}}, 0x0) 21:45:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb6260000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:44 executing program 3: msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/63) 21:45:44 executing program 2: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f00000001c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 21:45:44 executing program 3: syz_emit_ethernet(0x42, 0x0, 0x0) 21:45:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb95cba3b, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:44 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@s], 0x4) 21:45:44 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000001540)=[{&(0x7f0000000340)="2b950003f0bba1604f803f72a4a4dc9751e9f93248a219c46b04b1a7e110ac95626665e5e936b139ef1a5eeeeec602a6ee3aef75e3380b42", 0x38, 0xffffffff}], 0x40000, &(0x7f00000015c0)={[{@journal_ioprio}, {@usrquota}, {@data_journal}], [{@euid_eq}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) [ 651.865307] ax25_connect(): syz-executor.2 uses autobind, please contact jreuter@yaina.de 21:45:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, 0x0, &(0x7f0000006cc0)) [ 651.994979] __ntfs_warning: 138 callbacks suppressed [ 651.994990] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid end of sector marker. [ 652.021460] ntfs: (device loop4): ntfs_attr_find(): Inode is corrupt. Run chkdsk. [ 652.038541] ntfs: (device loop4): ntfs_read_inode_mount(): Failed to lookup attribute list attribute. You should run chkdsk. [ 652.056794] ntfs: (device loop4): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 652.067062] ntfs: (device loop4): ntfs_fill_super(): Failed to load essential metadata. [ 652.207608] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 652.217848] ntfs: (device loop1): ntfs_read_inode_mount(): MST fixup failed. $MFT is corrupt. [ 652.227924] ntfs: (device loop1): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 652.236884] ntfs: (device loop1): ntfs_fill_super(): Failed to load essential metadata. [ 652.290611] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. 21:45:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c00000012000163"], 0x4c}}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r0) 21:45:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000700)={&(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10, 0x0}, 0x0) 21:45:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0xd}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000002bc0)=[{{0x0, 0x0, 0x0}, 0x1de5}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x6) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x0, 0x0, 0x0, 0x6}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='attr/current\x00') preadv(r4, &(0x7f00000017c0), 0x375, 0x1e, 0x0) 21:45:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvmmsg(r0, &(0x7f0000001900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x22, 0x0) 21:45:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xc0ed0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:44 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x80a000, &(0x7f0000000200)) [ 652.489185] nla_parse: 13 callbacks suppressed [ 652.489197] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 652.507429] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 21:45:44 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x121081, 0x0) write$sequencer(r0, &(0x7f0000000080)=[@raw={0x0, 0x0, "1e845d169690"}, @echo=0x8, @l={0x92, 0x0, 0xd0}, @e={0xff, 0xa, 0x0, 0x0, @SEQ_NOTEON=@special}], 0x1c) [ 652.534681] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 652.555153] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 21:45:45 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf5ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 652.600529] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. [ 652.617707] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.3'. 21:45:45 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@t={0x0, 0x0, 0x0, 0x0, @generic=0x4}], 0x8) 21:45:45 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@s], 0x4) ioctl$SNDCTL_SEQ_RESET(r0, 0x5100) 21:45:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x4c, 0x12, 0xb05}, 0x4c}}, 0x0) 21:45:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000f"], 0x20}}, 0x0) 21:45:45 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 653.244050] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 653.278351] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 21:45:45 executing program 5: setgroups(0x2, &(0x7f00000001c0)=[0x0, 0x0]) 21:45:45 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 21:45:45 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000f"], 0x20}}, 0x0) 21:45:45 executing program 0: syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f0000000340)='+', 0x1, 0xffffffff}, {&(0x7f0000000440)='t', 0x1}, {&(0x7f0000000500)="f0", 0x1}], 0x40000, &(0x7f00000015c0)) 21:45:45 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfbffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 653.529747] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 21:45:45 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) connect$ax25(r0, &(0x7f00000001c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 21:45:45 executing program 2: syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f0000001540)=[{&(0x7f0000000340)='+', 0x1, 0xffffffff}], 0x0, &(0x7f00000015c0)={[{@data_journal}], [{@euid_eq}]}) 21:45:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000f"], 0x20}}, 0x0) 21:45:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000f"], 0x20}}, 0x0) [ 653.656494] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 653.660022] ax25_connect(): syz-executor.5 uses autobind, please contact jreuter@yaina.de 21:45:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:46 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f00000015c0)) 21:45:46 executing program 3: openat$md(0xffffffffffffff9c, &(0x7f0000000040), 0x80600, 0x0) 21:45:46 executing program 0: clock_nanosleep(0x2, 0x0, &(0x7f0000000200), 0x0) 21:45:46 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@profile={'permprofile ', '\xcc%^},(^/]\x00'}, 0x16) 21:45:46 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:46 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 21:45:46 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000010c0), 0x0, 0x0) ioctl$SNDCTL_TMR_TEMPO(r0, 0xc0045405, 0x0) 21:45:46 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@profile={'permprofile ', '\xcc%^},(^/]\x00'}, 0x16) 21:45:46 executing program 0: syz_emit_ethernet(0x42, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaa42158e88c8e39c08"], 0x0) 21:45:46 executing program 5: socket$netlink(0x10, 0x3, 0x7a77db6fdbdea4db) 21:45:46 executing program 3: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000000), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, 0x0) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000001440)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000015c0), 0x60082, 0x0) 21:45:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:46 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@profile={'permprofile ', '\xcc%^},(^/]\x00'}, 0x16) 21:45:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c00000012000163"], 0x4c}}, 0x0) 21:45:46 executing program 0: syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', 0x0, 0x0, 0x2, &(0x7f0000001540)=[{0x0}, {0x0}], 0x0, &(0x7f00000015c0)={[{@discard}]}) 21:45:46 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdfdffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:46 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f00000001c0)) 21:45:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c00000012000163"], 0x4c}}, 0x0) 21:45:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000000300)={0x4c, 0x12, 0xe81dbd6c645e4cab}, 0x4c}}, 0x0) 21:45:46 executing program 2: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@profile={'permprofile ', '\xcc%^},(^/]\x00'}, 0x16) 21:45:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c00000012000163"], 0x4c}}, 0x0) 21:45:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c00000012000163"], 0x4c}}, 0x0) 21:45:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100), r0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x1004, 0x12, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x89, 0x1, "89d6dfff37f05190d7bd04e8f94503bed3735d1cecbe0761a3e2148c9f3cad2da35bc47b860c7c43d671d7b5a0fe69b2c8e6beab28a8e3be4583e48030dfe616e2c4b8bb90d9c7377a6d5c317ead4bea1239031fa7907cf6dd8fa83c4df9835a22c53ea05f5708d30261d247158e6aad84fad2b3b596e13178e5e976e0f08592c1cc24278e"}, @INET_DIAG_REQ_BYTECODE={0xbd, 0x1, "b21e3ca4a817838c28e611c8f83a2f226152efc1d0fe9c8cf4fda09ec0273b3c7e5f79a7dd245809bd7d58e82d7eaebf982efa95fbd2717fd6ffd5288559806ac2316fa1b62da2976c51a54300eaa3beaf6fb2b6446429fc7c97098eebcc463a276f3efe59a86ea3947ea309ba33ed30400d28e1e979843f2b39b899ae755d8702954de671a62dadaf4062411bf49c56fcd7f4a8f4ed2cf6ccd866da73cdb5051706152982076fa55c47cef78d70fc6d40f29dd60031734f43"}, @INET_DIAG_REQ_BYTECODE={0xe69, 0x1, "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"}]}, 0x1004}}, 0x0) 21:45:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:47 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x185000, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000003c0), 0xffffffffffffffff) 21:45:47 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc(0xfffffffffffffffe, r0) 21:45:47 executing program 3: syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1, &(0x7f0000001540)=[{&(0x7f0000000340), 0x0, 0xffffffff}], 0x0, &(0x7f00000015c0)={[], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 21:45:47 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000000f00000004"], 0x20}}, 0x0) 21:45:47 executing program 2: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0), 0x2040, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_IFACE(r1, &(0x7f0000002900)={&(0x7f00000027c0), 0xc, &(0x7f00000028c0)={0x0}}, 0x24040001) openat$fuse(0xffffffffffffff9c, &(0x7f0000002940), 0x2, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 21:45:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) io_setup(0x6, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x2, 0x0, r0, 0x0}]) 21:45:47 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:47 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000080)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x1ac, 0x0, 0x0) 21:45:47 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 21:45:47 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="74b1bc2bd5b8ff090807ffe104"], 0x1c) ioctl$SNDCTL_SEQ_RESET(r0, 0x5100) 21:45:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:47 executing program 2: syz_genetlink_get_family_id$batadv(&(0x7f0000006e80), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, 0x0, 0x0) 21:45:47 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f0000000340)='+', 0x1}, {&(0x7f0000000440)="742ce4c0c26f3a", 0x7}, {&(0x7f0000000500)="f0", 0x1}], 0x0, 0x0) 21:45:47 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000001540)=[{&(0x7f0000000340)="2b95", 0x2, 0xffffffff}], 0x0, 0x0) 21:45:47 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNDCTL_FM_4OP_ENABLE(r0, 0x4004510f, &(0x7f0000000080)=0xffffffe4) 21:45:47 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f0000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0xfffffffffffffd5c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_PEER_COOKIE={0xc}, @L2TP_ATTR_PROTO_VERSION={0x5}, @L2TP_ATTR_SESSION_ID={0x8}]}, 0x30}}, 0x0) 21:45:47 executing program 2: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000001540), 0x0, 0x0) 21:45:47 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@t={0x81, 0x6, 0x0, 0x0, @generic}, @x={0x94, 0x0, "60a2fdad0726"}, @e={0xff, 0x1}, @n={0x0, 0x0, @generic}], 0x1c) 21:45:48 executing program 3: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000001540), 0x40000, &(0x7f00000015c0)={[{@mblk_io_submit}, {@nodiscard}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@discard}, {@usrquota}, {@data_journal}], [{@euid_eq}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 21:45:48 executing program 2: clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f00000000c0), 0x0) 21:45:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c00000012000163"], 0x4c}}, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r0) syz_genetlink_get_family_id$l2tp(&(0x7f00000005c0), r0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), r0) 21:45:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffff1f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:48 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKZEROOUT(r0, 0x127f, 0x0) 21:45:48 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f0000001300), 0x801, 0x0) 21:45:48 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffff1f00, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000000300)={0xec4, 0x12, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0xe75, 0x1, "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"}]}, 0xec4}}, 0x0) 21:45:48 executing program 5: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) write$sequencer(r0, &(0x7f00000000c0)=[@n={0x0, 0x0, @SEQ_NOTEON=@special}], 0x4) 21:45:48 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001400)={0x4c, 0x13, 0x1}, 0xa7}}, 0x0) 21:45:48 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f0000003880), 0x26600, 0x0) 21:45:48 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffaa55, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:48 executing program 5: syz_emit_ethernet(0x46, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "646cf0", 0x10, 0x21, 0x0, @private2, @ipv4={'\x00', '\xff\xff', @loopback}, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "22e1cb", 0x0, "eab0f2"}}}}}}}, 0x0) 21:45:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000006e80), r0) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000006f80)={&(0x7f0000006e40)={0x10, 0x0, 0x0, 0x10800150}, 0xc, &(0x7f0000006f40)={0x0}}, 0x0) 21:45:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) 21:45:49 executing program 0: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000), 0xe000, 0x0) 21:45:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f0000006c40)=@generic, &(0x7f0000006cc0)=0x80) 21:45:49 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:49 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffaa55, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:49 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@s={0x5, @SEQ_MIDIPUTC=0xfc}], 0x4) 21:45:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) 21:45:49 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, 0x0) 21:45:49 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, 0x0) 21:45:49 executing program 2: clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f00000000c0)={0x0, r0+10000000}, 0x0) 21:45:49 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000000040)=ANY=[@ANYBLOB="4c00000013000163"], 0x4c}}, 0x0) 21:45:49 executing program 5: r0 = syz_open_dev$ndb(&(0x7f0000000040), 0x0, 0x800) ioctl$NBD_CLEAR_QUE(r0, 0xab05) 21:45:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) 21:45:49 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007600)=[{{0x0, 0x0, &(0x7f0000004400)=[{&(0x7f0000006900)=""/92, 0x5c}], 0x1}}], 0x1, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2cb, 0x0, 0x0) [ 657.050698] __ntfs_warning: 160 callbacks suppressed [ 657.050710] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid end of sector marker. [ 657.088188] ntfs: (device loop4): ntfs_attr_find(): Inode is corrupt. Run chkdsk. 21:45:49 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, 0x0, 0x4) [ 657.150119] ntfs: (device loop4): ntfs_read_inode_mount(): Failed to lookup attribute list attribute. You should run chkdsk. [ 657.203543] ntfs: (device loop4): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 657.244208] ntfs: (device loop4): ntfs_fill_super(): Failed to load essential metadata. [ 657.347344] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 657.357458] ntfs: (device loop1): ntfs_read_inode_mount(): MST fixup failed. $MFT is corrupt. [ 657.369530] ntfs: (device loop1): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 657.385614] ntfs: (device loop1): ntfs_fill_super(): Failed to load essential metadata. [ 657.484057] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. 21:45:49 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfc, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:49 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), r0) 21:45:49 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007600)=[{{0x0, 0x0, &(0x7f0000004400)=[{&(0x7f0000006900)=""/92, 0x5c}], 0x1}}], 0x1, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2cb, 0x0, 0x0) 21:45:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f0000000340)="2b95", 0x2, 0xffffffff}, {&(0x7f0000000440)='t', 0x1, 0x6}, {&(0x7f0000000500)="f0", 0x1}], 0x0, 0x0) 21:45:49 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:50 executing program 2: syz_emit_ethernet(0x2c, &(0x7f0000000300)={@local, @remote, @void, {@ipx={0x8137, {0xffff, 0x1e, 0x0, 0x0, {@current, @broadcast}, {@current, @current}}}}}, 0x0) syz_emit_ethernet(0x46, &(0x7f00000004c0)={@broadcast, @broadcast, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "646cf0", 0x10, 0x21, 0x0, @private2, @ipv4={'\x00', '\xff\xff', @loopback}, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "22e1cb", 0x0, "eab0f2"}}}}}}}, 0x0) 21:45:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:50 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) read$sequencer(r0, 0x0, 0x0) 21:45:50 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007600)=[{{0x0, 0x0, &(0x7f0000004400)=[{&(0x7f0000006900)=""/92, 0x5c}], 0x1}}], 0x1, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2cb, 0x0, 0x0) 21:45:50 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007600)=[{{0x0, 0x0, &(0x7f0000004400)=[{&(0x7f0000006900)=""/92, 0x5c}], 0x1}}], 0x1, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2cb, 0x0, 0x0) 21:45:50 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f00000000c0)=ANY=[@ANYRES16], 0x8) 21:45:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:50 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffdfd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:50 executing program 2: setgroups(0x40000157, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]) 21:45:50 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@s={0x5, @SEQ_MIDIPUTC=0xcc}, @l={0x92, 0x0, 0xb0}, @v={0x93, 0x0, 0xa0, 0x0, @generic}], 0x14) 21:45:50 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x34, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6}]}]}, 0x34}}, 0x0) 21:45:50 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000007600)=[{{0x0, 0x0, &(0x7f0000004400)=[{&(0x7f0000006900)=""/92, 0x5c}], 0x1}}], 0x1, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x2cb, 0x0, 0x0) 21:45:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:50 executing program 5: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_nanosleep(0x0, 0x1, &(0x7f0000000040)={r0, r1+10000000}, 0x0) 21:45:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$ax25_int(r0, 0x101, 0x0, 0x0, 0x0) 21:45:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:50 executing program 2: syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x0, &(0x7f00000015c0)) 21:45:50 executing program 3: openat$md(0xffffffffffffff9c, &(0x7f0000000040), 0x96341, 0x0) 21:45:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:51 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@echo=0xfffffe01], 0x4) 21:45:51 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101901, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@echo=0xffffffff, @x={0x94, 0x0, "33fef3472d8c"}], 0xc) 21:45:51 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) 21:45:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x4c, 0x12, 0xb05, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x0, [0x0, 0x0, 0x4]}}}, 0x4c}}, 0x0) 21:45:51 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:51 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000000)=""/70, &(0x7f0000000080)=0x46) [ 659.067134] nla_parse: 17 callbacks suppressed [ 659.067144] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 21:45:51 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) 21:45:51 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000001540)=[{&(0x7f0000000340)="2b950003f0bba1604f803f72a4a4dc9751e9f93248a219c46b04b1a7", 0x1c, 0xffffffff}], 0x40000, &(0x7f00000015c0)={[{@mblk_io_submit}, {@nodiscard}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@usrquota}], [{@euid_eq}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) 21:45:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:51 executing program 3: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x10001, 0x0) [ 659.162564] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.0'. 21:45:51 executing program 0: clock_gettime(0x549e5d3fbe6ab181, 0x0) 21:45:51 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) 21:45:51 executing program 3: setgroups(0x0, 0x0) setgroups(0x6, &(0x7f0000000340)=[0x0, 0xee01, 0x0, 0x0, 0xee01, 0xee00]) 21:45:51 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000240), 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) 21:45:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='8'], 0x28}}, 0x0) 21:45:52 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff8c, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000000180)={&(0x7f0000000000), 0x8, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[], 0x2c}}, 0x0) 21:45:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000001340)=[{{&(0x7f0000000000)=@nl=@unspec, 0x80, 0x0}}], 0x1, 0x0) 21:45:52 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@generic, @l={0x92, 0x0, 0x0, 0x2, 0x0, 0x0, 0x7fff}], 0x9) 21:45:52 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001540)=[{&(0x7f0000000340)='+', 0x1}, {&(0x7f0000000440)='t', 0x1}, {&(0x7f0000000500)="f0", 0x1}], 0x0, 0x0) 21:45:52 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) connect$tipc(r0, 0x0, 0x0) 21:45:52 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000040)=[@x={0x94, 0x0, "0dcf9bf968c8"}, @s={0x5, @SEQ_MIDIPUTC, 0x11}, @raw={0xfe, 0x0, "abf0cd898f14"}, @e, @raw={0x0, 0x0, "42224a3ce76f"}, @l={0x92, 0x0, 0x0, 0x76}], 0x2c) 21:45:52 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000009"], 0x20}}, 0x0) 21:45:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:52 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) write$sequencer(r0, &(0x7f0000000080)=[@e={0xff, 0x3, 0x0, 0x0, @generic}], 0x8) 21:45:52 executing program 3: newfstatat(0xffffffffffffff9c, &(0x7f0000008080)='./file0\x00', 0x0, 0x0) [ 659.949008] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 659.988893] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 21:45:52 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff97, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4c000000170001"], 0x4c}}, 0x0) 21:45:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_PORT={0x6}]}]}, 0x2c}}, 0x0) 21:45:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, 0x0) 21:45:52 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 21:45:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:52 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000000)={0x3, @default}) 21:45:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001400)={0x4c, 0x13, 0x1, 0x0, 0x0, {0x11}}, 0x4c}}, 0x0) 21:45:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:52 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x6000, 0x0) 21:45:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x4c, 0x12, 0x1}, 0x4c}}, 0x0) 21:45:52 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001400)={0x4c, 0x13, 0x1, 0x0, 0x0, {0x6}}, 0x4c}}, 0x0) 21:45:53 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff5, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:53 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$SNDCTL_MIDI_PRETIME(0xffffffffffffffff, 0xc0046d00, 0x0) 21:45:53 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) ioctl$SNDCTL_MIDI_PRETIME(r0, 0xc0046d00, 0x0) 21:45:53 executing program 5: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000100)={{0x0, 0x0, 0xee01, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 21:45:53 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r0, &(0x7f0000006f80)={0x0, 0x0, &(0x7f0000006f40)={&(0x7f0000006ec0)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 21:45:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:53 executing program 3: r0 = socket(0x26, 0x5, 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0x0, 0x0, 0x0) 21:45:53 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) flock(r0, 0x6) 21:45:53 executing program 5: semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000380)={{0x0, 0x0, 0x0, 0xffffffffffffffff}}) 21:45:53 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x72, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) pwritev(r1, &(0x7f0000000780)=[{0x0}], 0x1, 0x0, 0x0) 21:45:53 executing program 3: pipe(&(0x7f0000000040)={0xffffffffffffffff}) fcntl$getown(r0, 0x6) 21:45:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:53 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffff6, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:53 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) lseek(r0, 0x0, 0x0) 21:45:53 executing program 0: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') symlink(&(0x7f0000000040)='./file2\x00', &(0x7f0000000080)='./file3\x00') symlinkat(&(0x7f00000000c0)='./file3\x00', 0xffffffffffffff9c, &(0x7f0000000100)='./file2\x00') 21:45:53 executing program 3: getgroups(0x1, &(0x7f0000000400)=[0x0]) 21:45:53 executing program 2: linkat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0xffffffffffffffff, 0x0, 0x0) 21:45:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:53 executing program 2: r0 = socket$inet6(0x1e, 0x3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x5, 0x0, 0x0) 21:45:53 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x10, r0, 0x0) 21:45:54 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) close(r0) writev(r0, &(0x7f00000001c0)=[{0x0}], 0x1) 21:45:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:54 executing program 0: accept$unix(0xffffffffffffff9c, 0x0, 0x0) 21:45:54 executing program 2: r0 = socket$inet6(0x1e, 0x3, 0x0) connect(r0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 21:45:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:54 executing program 3: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffff2c) 21:45:54 executing program 0: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') rmdir(&(0x7f0000000000)='./file0\x00') 21:45:54 executing program 5: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x2) 21:45:54 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffb, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:54 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0), 0x72, 0x0) flock(r0, 0x3) 21:45:54 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000003780)={0x0, 0x0, &(0x7f00000033c0)=[{&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="b26573cf9fe3e5b5decc7fff359ea84c0c9259b25b20253b2a2d18fcd740ddb92f9bd0d09eacdd308441642da31a5f6560778a821abc96c766dda91de8ed30bb9be2109dc71b2185060cc6d8391cff81863ad240afd61034a55423a40223bea74e7d140c41a2af087099d84e21f47318cbff6fd543b5abd31034f01c00c0d2d5d4b20b3e0b8417250a59ee1aee9682ea8c035464166c09491389b3a25ed14a6b8b7de43b0e67f41c710bf9e9b22df7b625", 0xb1}, {&(0x7f0000001240)="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", 0x230}], 0x3, &(0x7f0000003640)=[@rights, @cred, @rights, @cred, @rights, @cred, @cred, @rights, @cred], 0x120}, 0x0) [ 662.093254] __ntfs_warning: 155 callbacks suppressed [ 662.093265] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid end of sector marker. 21:45:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000340)={@private0, @local, @private1, 0x0, 0xffff}) [ 662.143820] ntfs: (device loop4): ntfs_attr_find(): Inode is corrupt. Run chkdsk. [ 662.152687] ntfs: (device loop4): ntfs_read_inode_mount(): Failed to lookup attribute list attribute. You should run chkdsk. 21:45:54 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x2, 0x40, 0x0, 0x0) 21:45:54 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xb}, 0x40) [ 662.207351] ntfs: (device loop4): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 662.249269] ntfs: (device loop4): ntfs_fill_super(): Failed to load essential metadata. 21:45:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000000)=""/176, &(0x7f00000000c0)=0xb0) 21:45:54 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/slabinfo\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) [ 662.346029] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid end of sector marker. [ 662.386115] ntfs: (device loop4): ntfs_attr_find(): Inode is corrupt. Run chkdsk. [ 662.424164] ntfs: (device loop4): ntfs_read_inode_mount(): Failed to lookup attribute list attribute. You should run chkdsk. [ 662.473562] ntfs: (device loop4): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 662.524153] ntfs: (device loop4): ntfs_fill_super(): Failed to load essential metadata. 21:45:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:55 executing program 0: r0 = getpgid(0x0) r1 = fork() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000080)) 21:45:55 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:45:55 executing program 2: prctl$PR_SET_MM(0x35, 0x6, &(0x7f0000ffc000/0x2000)=nil) 21:45:55 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:55 executing program 5: openat$incfs(0xffffffffffffff9c, &(0x7f00000000c0)='.log\x00', 0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f00000001c0)='.log\x00', 0x240003, 0x0) 21:45:55 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) io_setup(0x7, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000880)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0x0, r0, 0x0}]) 21:45:55 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74, 0x0]}}]}) 21:45:55 executing program 0: r0 = getpgid(0x0) r1 = fork() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000080)) 21:45:55 executing program 2: r0 = socket(0x1, 0x3, 0x0) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x10040) 21:45:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x1, 0x4, 0x201}, 0x14}}, 0x0) 21:45:55 executing program 0: r0 = getpgid(0x0) r1 = fork() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000080)) 21:45:55 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000040), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x800455d1, 0x0) 21:45:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:55 executing program 0: r0 = getpgid(0x0) r1 = fork() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000080)) 21:45:55 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'batadv_slave_1\x00', &(0x7f00000000c0)=@ethtool_eee={0x45}}) 21:45:55 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$sock(r0, &(0x7f0000000200)={&(0x7f0000000000)=@ieee802154={0x24, @long}, 0x80, 0x0, 0x0, &(0x7f0000000140)=[@timestamping={{0x14}}], 0x18}, 0x0) 21:45:55 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x1, 0x4, 0x201}, 0x14}}, 0x0) 21:45:55 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x0, 0x0, 0x0) 21:45:55 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffe, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x16, 0x4) 21:45:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x1, 0x4, 0x201}, 0x14}}, 0x0) 21:45:56 executing program 0: socket(0xa, 0x2, 0x4) 21:45:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) mmap(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0xe, 0x10, r0, 0x0) 21:45:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x7, &(0x7f0000000980)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x3, 0xd4, &(0x7f00000002c0)=""/212, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:45:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) 21:45:56 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x14, 0x1, 0x4, 0x201}, 0x14}}, 0x0) 21:45:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYBLOB="140080"], 0x14}}, 0x0) 21:45:56 executing program 3: io_setup(0x7, &(0x7f0000000080)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x989680}, 0x0) 21:45:56 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xedc000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:56 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x11, 0x3, &(0x7f0000002040)=@framed, &(0x7f0000002080)='syzkaller\x00', 0x8000, 0xc0, &(0x7f00000020c0)=""/192, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:45:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:56 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xfc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xf5, 0x4, "177c9b34803c9659acb226cdb6bc28f534065b8ad35b80491ca3f66b3fa352027bf2f428239656371a72e0c1cc3a1448bdc6d6ca150a8b0141209baa803b586aa8a4f6bf20062a86eda0a0a8f38a5568f25b5e7c85f79d3cd2f5c5942d51900215ef8d685891f1456a3bb20cabe36ae78f736fa4f1fd0c12cccfe96c111af4cb8b3c82b7ec1e11cd857e8da08cafbd60d65e35ce54cd91b24fec639f7aeb0e297f0c0ed1b593d87c8e25fd62d804741ba11fbf612eccb8133eebfd1899d05da80c61e30ecf67ee50dbb107f9df67dcabd81b83f473d51549211b2ef253965c4519b411080af908f6290923c42853118b01"}]}, @ETHTOOL_A_FEATURES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_FEATURES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x12c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x88, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '%:$-\'\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, ']:!\xda..!\xe0&\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '-(}\'*:@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '*$&$\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x89, 0x4, "4b4596a221ec4c072f2a98ea25689a4a2921970ab664b5de57aca2b2ba08c8474e35d0e31301affd54f004ae5fe279fc43f0ec99a24970cda7e70d460db87b7ba69a635fc67a9845edaa5ccb96d01267234571a11a3e1df903c8a7bf2b7ed3ec5f4591c47cc9cf89faea4fc7ab8deaceea66503ae6961eab3b952ce8c5578002f47c026171"}, @ETHTOOL_A_BITSET_VALUE={0x5, 0x4, "19"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_FEATURES_WANTED={0xbb4, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "2085f3a5af4da26aed5ec92c998a1f400e7d450d891c59e9b724fe6bc581f8f75cf0d52aadb8995db70386d5cbfda1a64469dbf9d462d4ad6e6bf8fd9b29aa59861a1eeb1591eadf96b8a7e524791d943f11be7d3fb8588468c075eb42636a697f8264cdb29b8b5f66cfb4efe8"}, @ETHTOOL_A_BITSET_VALUE={0xb19, 0x4, "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"}]}]}, 0xec4}}, 0x0) 21:45:56 executing program 2: prctl$PR_SET_MM(0x7, 0x0, &(0x7f0000ffc000/0x2000)=nil) 21:45:56 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002200)={0x11, 0x3, &(0x7f0000002040)=@framed, &(0x7f0000002080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:45:56 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000a40)={&(0x7f00000001c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, 0x0, 0x0, &(0x7f0000000940)=[@txtime={{0x24}}], 0x18}, 0x0) 21:45:56 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x19, 0x0, 0x0) 21:45:56 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nr_inodes}]}) 21:45:56 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 21:45:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1300000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:56 executing program 0: prctl$PR_SET_MM(0x43724f53, 0x0, &(0x7f0000ffc000/0x2000)=nil) 21:45:57 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:57 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x8, 0x0, 0x0) 21:45:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) 21:45:57 executing program 5: sched_rr_get_interval(0x0, &(0x7f0000000000)) fork() sched_rr_get_interval(0x0, &(0x7f0000000040)) 21:45:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0xf0ff7f00000000}}, 0x0) 21:45:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:57 executing program 2: getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 21:45:57 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000300)=0x1b, 0x4) 21:45:57 executing program 0: io_setup(0x7, &(0x7f0000000080)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={[0x74d]}, 0x8}) 21:45:57 executing program 3: mlock(&(0x7f0000ff7000/0x9000)=nil, 0x9000) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) pkey_mprotect(&(0x7f0000ff6000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) 21:45:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x28082) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000200)={0x0, {}, 0x0, {}, 0x7ff, 0x2, 0x1a, 0x10, "2dc44809f674de82b4d392778afc2a1e4161e73e996e2cb028b3a6732bb7c1d0c70c29e2ddedbbacb793a351a115c6ac99af9f629630bb5e2c7a1e30eec53475", "8446cd7460eeab7e0e1b75cced097f7ab2e48224d67b600ebdec83a4fb4b776e", [0x6, 0x1f]}) 21:45:57 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:57 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000002440), 0x4000, 0x0) 21:45:57 executing program 3: munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 21:45:57 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0xe03f0300}, 0x0) 21:45:57 executing program 5: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x24041, 0x0) 21:45:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2100000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:58 executing program 0: clock_getres(0x35561e299e3e4822, 0x0) 21:45:58 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2300000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:58 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x2, &(0x7f0000000a80)=@security={'security\x00', 0xe, 0x4, 0x2e8, 0xffffffff, 0x0, 0xf0, 0x1c0, 0xffffffff, 0xffffffff, 0x2c8, 0x2c8, 0x2c8, 0xffffffff, 0x4, 0x0, {[{{@ip={@multicast1, @dev, 0x0, 0x0, 'veth1_macvtap\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7850daaecbd60161e1d237e84081a09a27120d4530b5ef3c3273910cfa7e"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x348) 21:45:58 executing program 3: io_setup(0x7, &(0x7f0000000080)=0x0) io_getevents(r0, 0x1, 0x1, &(0x7f00000000c0)=[{}], 0x0) 21:45:58 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)={[{@gid}]}) 21:45:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 21:45:58 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:58 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000200)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x8000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) 21:45:58 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x0) 21:45:58 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3b27000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'veth0_vlan\x00', &(0x7f0000000340)=@ethtool_rxfh_indir}) 21:45:58 executing program 5: getdents(0xffffffffffffffff, &(0x7f0000000d40)=""/173, 0xad) fchdir(0xffffffffffffffff) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) perf_event_open(&(0x7f0000000840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000003c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d880)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r1}], 0x3f, "9eda14d0ddeab5"}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 21:45:58 executing program 2: prctl$PR_SET_MM(0xe, 0x0, &(0x7f0000ffc000/0x2000)=nil) 21:45:58 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3bba5cb900000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:58 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x22, 0x0, 0x0) [ 666.279577] hub 9-0:1.0: USB hub found [ 666.302090] hub 9-0:1.0: 8 ports detected 21:45:59 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001880)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) io_setup(0x2, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x0, r0, 0x0}]) 21:45:59 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f00000003c0)) 21:45:59 executing program 5: pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xa, 0xffffffffffffffff) openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/slabinfo\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 21:45:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xf) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r0) 21:45:59 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:59 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7ffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:45:59 executing program 2: prctl$PR_SET_MM(0x1e, 0x0, &(0x7f0000ffc000/0x2000)=nil) 21:45:59 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=@bridge_newvlan={0x18}, 0x18}}, 0x0) 21:45:59 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@l2tp={0x2, 0x0, @rand_addr=0x64010102}, 0x80) 21:45:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) io_setup(0x7, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0x0, r0, &(0x7f00000000c0)="d24a", 0x2, 0xcae3, 0x0, 0x2}]) 21:45:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)={0x14, 0x0, 0x101}, 0x14}}, 0x0) 21:45:59 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:45:59 executing program 0: r0 = socket(0xa, 0x3, 0x4c) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f00000011c0)={0x0, 0x0, &(0x7f0000001180)={0x0}}, 0x0) 21:45:59 executing program 5: symlink(&(0x7f0000000540)='./file0\x00', &(0x7f0000000f00)='./file0\x00') open$dir(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) 21:45:59 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/d'], &(0x7f0000000180)='./file0\x00', 0x0, 0x3804, 0x0) 21:45:59 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x30, &(0x7f0000000a80)=@security={'security\x00', 0xe, 0x4, 0x2e8, 0xffffffff, 0x0, 0xf0, 0x1c0, 0xffffffff, 0xffffffff, 0x2c8, 0x2c8, 0x2c8, 0xffffffff, 0x4, 0x0, {[{{@ip={@multicast1, @dev, 0x0, 0x0, 'veth1_macvtap\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7850daaecbd60161e1d237e84081a09a27120d4530b5ef3c3273910cfa7e"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x348) [ 667.163254] __ntfs_warning: 172 callbacks suppressed [ 667.163268] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid end of sector marker. 21:45:59 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xd, &(0x7f0000000a80)=@security={'security\x00', 0xe, 0x4, 0x2e8, 0xffffffff, 0x0, 0xf0, 0x1c0, 0xffffffff, 0xffffffff, 0x2c8, 0x2c8, 0x2c8, 0xffffffff, 0x4, 0x0, {[{{@ip={@multicast1, @dev, 0x0, 0x0, 'veth1_macvtap\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7850daaecbd60161e1d237e84081a09a27120d4530b5ef3c3273910cfa7e"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x348) [ 667.203760] ntfs: (device loop4): ntfs_attr_find(): Inode is corrupt. Run chkdsk. [ 667.241147] ntfs: (device loop4): ntfs_read_inode_mount(): Failed to lookup attribute list attribute. You should run chkdsk. [ 667.301731] ntfs: (device loop4): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 667.317143] ntfs: (device loop4): ntfs_fill_super(): Failed to load essential metadata. [ 667.382870] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid end of sector marker. [ 667.396021] ntfs: (device loop4): ntfs_attr_find(): Inode is corrupt. Run chkdsk. [ 667.405532] ntfs: (device loop4): ntfs_read_inode_mount(): Failed to lookup attribute list attribute. You should run chkdsk. [ 667.418241] ntfs: (device loop4): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 667.432193] ntfs: (device loop4): ntfs_fill_super(): Failed to load essential metadata. 21:46:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xe000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:00 executing program 2: syz_open_dev$loop(&(0x7f0000000080), 0xffffffffffffffff, 0x244001) 21:46:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x4000, 0x0) 21:46:00 executing program 5: io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0), 0x8}) 21:46:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) setxattr$incfs_metadata(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) 21:46:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:00 executing program 3: prctl$PR_SET_MM(0x1b, 0x0, &(0x7f0000ffc000/0x2000)=nil) 21:46:00 executing program 5: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001880)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) io_setup(0x2, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x8}]) 21:46:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:00 executing program 2: prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffc000/0x2000)=nil) 21:46:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f00000042c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002d40)=[{0x10, 0x1, 0x2}], 0x10}, 0x0) 21:46:00 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$sock(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=[@txtime={{0x18}}], 0x18}, 0x0) 21:46:00 executing program 2: prctl$PR_SET_MM(0x1d, 0x6, &(0x7f0000ffc000/0x2000)=nil) 21:46:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) 21:46:00 executing program 3: r0 = fork() setpgid(0xffffffffffffffff, 0x0) wait4(r0, 0x0, 0x1, 0x0) 21:46:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5526000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x100000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:00 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xd, 0x0, 0x0) 21:46:00 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x3, 0x0, 0x0) 21:46:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000004c0)={0x0, 0x8000000000000000}}, 0x0) 21:46:00 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000a40)={0x0, 0x0, 0x0}, 0x0) 21:46:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x55aaffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:00 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe, 0x0, 0x0, 0x8}, 0x40) 21:46:00 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x7, &(0x7f0000000a80)=@security={'security\x00', 0xe, 0x4, 0x2e8, 0xffffffff, 0x0, 0xf0, 0x1c0, 0xffffffff, 0xffffffff, 0x2c8, 0x2c8, 0x2c8, 0xffffffff, 0x4, 0x0, {[{{@ip={@multicast1, @dev, 0x0, 0x0, 'veth1_macvtap\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7850daaecbd60161e1d237e84081a09a27120d4530b5ef3c3273910cfa7e"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x348) 21:46:00 executing program 0: pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000008, 0xffffffffffffffff) 21:46:00 executing program 5: r0 = socket(0x2, 0x3, 0x1f) connect$packet(r0, &(0x7f0000000140)={0x2, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x14) getsockname$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x6, 0x3, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 21:46:01 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) r3 = socket$packet(0x11, 0x2, 0x300) sendmsg$unix(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r0, @ANYBLOB='$'], 0x50}, 0x0) 21:46:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, 0x0) 21:46:01 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@l2tp={0xa}, 0x80) 21:46:01 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6022000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:01 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000a40)={&(0x7f00000001c0)=@in={0x2, 0x4e23, @dev}, 0x80, 0x0}, 0x0) 21:46:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@raw={0x8, 0x0, {"0027d2ab20"}}, &(0x7f0000000140), 0x0) 21:46:01 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x200000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:01 executing program 2: mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 21:46:01 executing program 0: prctl$PR_SET_MM(0x23, 0x3, &(0x7f0000ffc000/0x2000)=nil) 21:46:01 executing program 2: r0 = getpgid(0x0) r1 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, 0xffffffffffffffff, 0x0) 21:46:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0x0, 0x4e23}, 0x80) 21:46:01 executing program 5: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffc000/0x1000)=nil) 21:46:01 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0xc40, 0x0) 21:46:01 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000a80)=@security={'security\x00', 0xe, 0x4, 0x2e8, 0xffffffff, 0x0, 0xf0, 0x1c0, 0xffffffff, 0xffffffff, 0x2c8, 0x2c8, 0x2c8, 0xffffffff, 0x4, 0x0, {[{{@ip={@multicast1, @dev, 0x0, 0x0, 'veth1_macvtap\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7850daaecbd60161e1d237e84081a09a27120d4530b5ef3c3273910cfa7e"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x348) 21:46:01 executing program 2: prctl$PR_SET_MM(0xd, 0x0, &(0x7f0000ffc000/0x2000)=nil) 21:46:01 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={[{@nr_inodes={'nr_inodes', 0x3d, [0x36, 0x0]}}]}) 21:46:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000003c0)={0x2020}, 0x2020) 21:46:02 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x300000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:02 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:02 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000c80), &(0x7f0000000cc0)='./file0\x00', 0x0, 0x0, 0x0, 0x800841, &(0x7f0000001180)) 21:46:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f00000000c0)=0xfffffffc, 0x4) 21:46:02 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000000c0)={0x0, 0x0, "44c824", 0xc4}) 21:46:02 executing program 0: prctl$PR_SET_MM(0x53564d41, 0x0, &(0x7f0000ffc000/0x2000)=nil) 21:46:02 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:02 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000a40)={&(0x7f00000001c0)=@in={0x2, 0x0, @multicast1}, 0x80, 0x0, 0x48, &(0x7f0000000940)=[@txtime={{0x18}}], 0x18}, 0x0) 21:46:02 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000001840)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 21:46:02 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000040)={0x0, @in={0x2, 0x0, @remote}, @l2={0x1f, 0x0, @none}, @llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, 0x4}) 21:46:02 executing program 5: io_setup(0x7, &(0x7f0000000080)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140), 0x8}) [ 670.038178] tmpfs: Bad mount option fscontext 21:46:02 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 670.066206] tmpfs: Bad mount option fscontext 21:46:02 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:02 executing program 0: syslog(0x3, &(0x7f0000000200)=""/207, 0xcf) 21:46:02 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x16, 0x4) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000380)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000340)={0x0}}, 0x0) 21:46:02 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid_for_children\x00') ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 21:46:02 executing program 5: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}}, 0x0) 21:46:02 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:02 executing program 2: prctl$PR_SET_MM(0xf, 0x0, &(0x7f0000ffc000/0x2000)=nil) 21:46:02 executing program 3: prctl$PR_SET_MM(0x1d, 0x0, &(0x7f0000ffc000/0x2000)=nil) 21:46:03 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@mangle={'mangle\x00', 0x1f, 0x6, 0x538, 0x0, 0xf0, 0x1d8, 0x1d8, 0xf0, 0x5c8, 0x5c8, 0x5c8, 0x5c8, 0x5c8, 0x6, 0x0, {[{{@ipv6={@empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'erspan0\x00', 'virt_wifi0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private0}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast1, @ipv4=@remote}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffd}}}}, 0x598) 21:46:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x4000}, 0x0) 21:46:03 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000000000)={'bridge0\x00', @ifru_hwaddr=@random}) 21:46:03 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x500000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:03 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 21:46:03 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000a40)={&(0x7f00000001c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, 0x0, 0x0, &(0x7f0000000940)=[@mark={{0x14}}], 0x18}, 0x0) 21:46:03 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/'], &(0x7f0000000180)='./file0\x00', &(0x7f0000000480)='f2fs\x00', 0x3804, &(0x7f00000004c0)='TCPOPTSTRIP\x00') 21:46:03 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x19, &(0x7f0000000a80)=@security={'security\x00', 0xe, 0x4, 0x2e8, 0xffffffff, 0x0, 0xf0, 0x1c0, 0xffffffff, 0xffffffff, 0x2c8, 0x2c8, 0x2c8, 0xffffffff, 0x4, 0x0, {[{{@ip={@multicast1, @dev, 0x0, 0x0, 'veth1_macvtap\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7850daaecbd60161e1d237e84081a09a27120d4530b5ef3c3273910cfa7e"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x348) 21:46:03 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8503000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:03 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8703000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:03 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x32, 0x0, 0x0) 21:46:03 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000a40)={&(0x7f00000001c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, 0x0, 0x0, &(0x7f0000000940)=[@txtime={{0x18, 0x1, 0x25}}], 0x18}, 0x0) 21:46:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0xfc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0xf5, 0x4, "177c9b34803c9659acb226cdb6bc28f534065b8ad35b80491ca3f66b3fa352027bf2f428239656371a72e0c1cc3a1448bdc6d6ca150a8b0141209baa803b586aa8a4f6bf20062a86eda0a0a8f38a5568f25b5e7c85f79d3cd2f5c5942d51900215ef8d685891f1456a3bb20cabe36ae78f736fa4f1fd0c12cccfe96c111af4cb8b3c82b7ec1e11cd857e8da08cafbd60d65e35ce54cd91b24fec639f7aeb0e297f0c0ed1b593d87c8e25fd62d804741ba11fbf612eccb8133eebfd1899d05da80c61e30ecf67ee50dbb107f9df67dcabd81b83f473d51549211b2ef253965c4519b411080af908f6290923c42853118b01"}]}, @ETHTOOL_A_FEATURES_HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gretap0\x00'}]}, @ETHTOOL_A_FEATURES_HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_FEATURES_HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x12c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x88, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '%:$-\'\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, ']:!\xda..!\xe0&\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '-(}\'*:@\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '*$&$\x00'}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x89, 0x4, "4b4596a221ec4c072f2a98ea25689a4a2921970ab664b5de57aca2b2ba08c8474e35d0e31301affd54f004ae5fe279fc43f0ec99a24970cda7e70d460db87b7ba69a635fc67a9845edaa5ccb96d01267234571a11a3e1df903c8a7bf2b7ed3ec5f4591c47cc9cf89faea4fc7ab8deaceea66503ae6961eab3b952ce8c5578002f47c026171"}, @ETHTOOL_A_BITSET_VALUE={0x5, 0x4, "19"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_FEATURES_WANTED={0xbb4, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x1c, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x71, 0x4, "2085f3a5af4da26aed5ec92c998a1f400e7d450d891c59e9b724fe6bc581f8f75cf0d52aadb8995db70386d5cbfda1a64469dbf9d462d4ad6e6bf8fd9b29aa59861a1eeb1591eadf96b8a7e524791d943f11be7d3fb8588468c075eb42636a697f8264cdb29b8b5f66cfb4efe8"}, @ETHTOOL_A_BITSET_VALUE={0xb19, 0x4, "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"}]}]}, 0xec4}}, 0x0) 21:46:03 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8803000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:03 executing program 0: getxattr(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) 21:46:03 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x600000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:03 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xfffffffffffffe7e, &(0x7f0000000140)={&(0x7f00000001c0)={0x10, 0x3fb, 0x0, 0x0, 0x0, "", ["", "", "", "", "", "", "", ""]}, 0x10}}, 0x0) 21:46:03 executing program 5: accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000640)=@mangle={'mangle\x00', 0x1f, 0x6, 0x538, 0xf0, 0x0, 0x2a8, 0xf0, 0x2a8, 0x468, 0x468, 0x468, 0x468, 0x468, 0x6, 0x0, {[{{@ipv6={@empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'erspan0\x00', 'virt_wifi0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private0}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast1, @ipv4=@remote}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) fork() fork() setpgid(0xffffffffffffffff, 0x0) syz_mount_image$fuse(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRESHEX, @ANYBLOB, @ANYRESDEC]) 21:46:03 executing program 2: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3000, 0x7, &(0x7f0000ffc000/0x3000)=nil) 21:46:03 executing program 0: pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000003, 0xffffffffffffffff) 21:46:03 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8903000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:04 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xa, &(0x7f0000000a80)=@security={'security\x00', 0xe, 0x4, 0x2e8, 0xffffffff, 0x0, 0xf0, 0x1c0, 0xffffffff, 0xffffffff, 0x2c8, 0x2c8, 0x2c8, 0xffffffff, 0x4, 0x0, {[{{@ip={@multicast1, @dev, 0x0, 0x0, 'veth1_macvtap\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7850daaecbd60161e1d237e84081a09a27120d4530b5ef3c3273910cfa7e"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x348) 21:46:04 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f0000000180)=ANY=[], 0x14}}, 0x0) 21:46:04 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) 21:46:04 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x18, 0x2, &(0x7f0000000880)=@raw=[@map_val], &(0x7f00000008c0)='syzkaller\x00', 0x6, 0x1000, &(0x7f00000016c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8a03000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:04 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='size=D']) [ 671.827249] tmpfs: Bad value 'D' for mount option 'size' [ 671.837358] tmpfs: Bad value 'D' for mount option 'size' 21:46:04 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x700000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:04 executing program 3: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$snddsp_control(&(0x7f0000ffe000/0x2000)=nil, 0x1000, 0x4, 0x10, r0, 0x83000000) 21:46:04 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) syz_genetlink_get_family_id$team(&(0x7f0000000040), r0) 21:46:04 executing program 0: r0 = syz_usbip_server_init(0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 21:46:04 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000a40)={&(0x7f00000001c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, 0x0, 0x0, &(0x7f0000000940)=[@txtime={{0x18, 0x300}}], 0x18}, 0x0) 21:46:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8b03000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:04 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xb, 0xf7, 0x800, 0xffffffff, 0x81}, 0x40) [ 672.072721] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 21:46:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000500), 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 21:46:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) accept4(r0, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80, 0x0) r1 = socket(0x10, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x11, 0xa, &(0x7f0000000640)=@mangle={'mangle\x00', 0x1f, 0x6, 0x538, 0xf0, 0x0, 0x2a8, 0xf0, 0x2a8, 0x468, 0x468, 0x468, 0x468, 0x468, 0x6, 0x0, {[{{@ipv6={@empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'erspan0\x00', 'virt_wifi0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private0}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast1, @ipv4=@remote}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) fork() fork() r2 = fork() setpgid(r2, 0x0) 21:46:04 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001900)={0x0, 0x0, 0x0}, 0x4000840) 21:46:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8c03000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000004c0)={0x0}, 0x1, 0x0, 0x701e}, 0x0) [ 672.365715] __ntfs_warning: 179 callbacks suppressed [ 672.365727] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid end of sector marker. [ 672.441092] ntfs: (device loop4): ntfs_attr_find(): Inode is corrupt. Run chkdsk. [ 672.464246] ntfs: (device loop4): ntfs_read_inode_mount(): Failed to lookup attribute list attribute. You should run chkdsk. [ 672.478243] ntfs: (device loop4): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 672.487450] ntfs: (device loop4): ntfs_fill_super(): Failed to load essential metadata. [ 672.547377] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 672.555890] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid end of sector marker. [ 672.595568] ntfs: (device loop4): ntfs_attr_find(): Inode is corrupt. Run chkdsk. [ 672.605997] ntfs: (device loop4): ntfs_read_inode_mount(): Failed to lookup attribute list attribute. You should run chkdsk. [ 672.625695] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 672.631997] ntfs: (device loop1): ntfs_read_inode_mount(): MST fixup failed. $MFT is corrupt. 21:46:05 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:05 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000a40)={&(0x7f00000001c0)=@in={0x2, 0x4e24, @multicast1}, 0x80, 0x0, 0x0, &(0x7f0000000940)=[@txtime={{0x18}}], 0x18}, 0x0) 21:46:05 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB='/'], &(0x7f0000000180)='./file0\x00', 0x0, 0x3804, &(0x7f00000004c0)='TCPOPTSTRIP\x00') 21:46:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) accept4(r0, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80, 0x0) r1 = socket(0x10, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x11, 0xa, &(0x7f0000000640)=@mangle={'mangle\x00', 0x1f, 0x6, 0x538, 0xf0, 0x0, 0x2a8, 0xf0, 0x2a8, 0x468, 0x468, 0x468, 0x468, 0x468, 0x6, 0x0, {[{{@ipv6={@empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'erspan0\x00', 'virt_wifi0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private0}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast1, @ipv4=@remote}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) fork() fork() r2 = fork() setpgid(r2, 0x0) 21:46:05 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x21, &(0x7f0000000a80)=@security={'security\x00', 0xe, 0x4, 0x2e8, 0xffffffff, 0x0, 0xf0, 0x1c0, 0xffffffff, 0xffffffff, 0x2c8, 0x2c8, 0x2c8, 0xffffffff, 0x4, 0x0, {[{{@ip={@multicast1, @dev, 0x0, 0x0, 'veth1_macvtap\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7850daaecbd60161e1d237e84081a09a27120d4530b5ef3c3273910cfa7e"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x348) 21:46:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:05 executing program 0: prctl$PR_SET_MM(0x24, 0x0, &(0x7f0000ffc000/0x2000)=nil) 21:46:05 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000000000)={0x1, @write_voice_setting={{0xc26, 0x2}}}, 0x6) 21:46:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8d03000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:05 executing program 3: r0 = epoll_create(0x5c8) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 21:46:05 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0xc, &(0x7f0000000a80)=@security={'security\x00', 0xe, 0x4, 0x2e8, 0xffffffff, 0x0, 0xf0, 0x1c0, 0xffffffff, 0xffffffff, 0x2c8, 0x2c8, 0x2c8, 0xffffffff, 0x4, 0x0, {[{{@ip={@multicast1, @dev, 0x0, 0x0, 'veth1_macvtap\x00', 'veth0_virt_wifi\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast}}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @local}}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "7850daaecbd60161e1d237e84081a09a27120d4530b5ef3c3273910cfa7e"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x348) 21:46:05 executing program 5: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x4d0, 0x0, 0x59000000, 0x294, 0x0, 0x294, 0x408, 0x378, 0x378, 0x408, 0x378, 0x3, 0x0, {[{{@uncond, 0x0, 0x2b4, 0x2fc, 0x52020000, {}, [@common=@inet=@hashlimit2={{0x150}, {'veth1\x00', {0xe2, 0x0, 0x63, 0x0, 0x0, 0x1, 0x3fe}}}, @common=@unspec=@string={{0xc0}, {0x0, 0x0, 'kmp\x00', "796268880ccc1ead08db713078a9af4f9b88574f7f1bf77d65420c28387d342331a24364f67cdd5531e34b768a6af25a06020a619a8153fb71779c857f8a000f42a2770770960471510115cbbdcf01572fb35d1e47674b41b6c4a3dfe224559d8763d5f9bc9fbae3ee50f987a1ab15581079624c1d69074c91660b783b95127a", 0x76}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa4, 0x10c}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa4, 0xc8}, {0x24}}}}, 0x52c) 21:46:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:05 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) accept4(r0, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80, 0x0) r1 = socket(0x10, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x11, 0xa, &(0x7f0000000640)=@mangle={'mangle\x00', 0x1f, 0x6, 0x538, 0xf0, 0x0, 0x2a8, 0xf0, 0x2a8, 0x468, 0x468, 0x468, 0x468, 0x468, 0x6, 0x0, {[{{@ipv6={@empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'erspan0\x00', 'virt_wifi0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private0}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast1, @ipv4=@remote}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) fork() fork() r2 = fork() setpgid(r2, 0x0) 21:46:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$BATADV_CMD_SET_VLAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[], 0x24}}, 0x0) 21:46:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @gretap={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_GRE_IFLAGS={0x6}]}}}]}, 0x3c}}, 0x0) 21:46:05 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x200004) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) preadv(r3, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) sendfile(r0, r2, 0x0, 0x80001d00c0d0) 21:46:05 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x900000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:05 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27", 0x16) 21:46:05 executing program 3: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @private1, @loopback={0x0, 0x460c6}}}) 21:46:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xa803000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000024003d0f000000f6ffffffffffffff00", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff0000000008000100647272"], 0x2c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x30, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) 21:46:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) accept4(r0, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80, 0x0) r1 = socket(0x10, 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x11, 0xa, &(0x7f0000000640)=@mangle={'mangle\x00', 0x1f, 0x6, 0x538, 0xf0, 0x0, 0x2a8, 0xf0, 0x2a8, 0x468, 0x468, 0x468, 0x468, 0x468, 0x6, 0x0, {[{{@ipv6={@empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', [], [], 'erspan0\x00', 'virt_wifi0\x00'}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@broadcast, @ipv6=@private0}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@TCPOPTSTRIP={0x40}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@multicast1, @ipv4=@remote}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) fork() fork() r2 = fork() setpgid(r2, 0x0) 21:46:06 executing program 3: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @private1, @loopback={0x0, 0x460c6}}}) 21:46:06 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000080), 0x0, 0x84882) write$cgroup_freezer_state(r0, &(0x7f00000000c0)='FROZEN\x00', 0xfffffdef) [ 673.708209] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb027000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 673.777360] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:06 executing program 0: syz_mount_image$msdos(&(0x7f0000000040), 0x0, 0x8000d5, 0x1, &(0x7f0000000080)=[{0x0}], 0x0, &(0x7f0000000280)=ANY=[]) chdir(&(0x7f0000000000)='./file1\x00') r0 = open(&(0x7f0000000240)='./file0\x00', 0x188c5, 0x0) r1 = open$dir(&(0x7f0000000340)='./file0\x00', 0x16d900, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r2, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x180) sendfile(r0, r1, 0x0, 0x1000000) 21:46:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000024003d0f000000f6ffffffffffffff00", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff0000000008000100647272"], 0x2c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x30, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) 21:46:06 executing program 3: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @private1, @loopback={0x0, 0x460c6}}}) [ 674.025246] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:06 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1300000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000024003d0f000000f6ffffffffffffff00", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff0000000008000100647272"], 0x2c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x30, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) 21:46:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xb626000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:06 executing program 3: r0 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000b40)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @private1, @loopback={0x0, 0x460c6}}}) 21:46:06 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000024003d0f000000f6ffffffffffffff00", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff0000000008000100647272"], 0x2c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x30, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) 21:46:06 executing program 0: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) ioctl$CHAR_RAW_DISCARD(r0, 0x401012f7, &(0x7f0000000080)=0xf403) 21:46:06 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) [ 674.286849] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf5ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:06 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000002b80)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x4}}}]}, 0x34}}, 0x0) [ 674.387862] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 21:46:06 executing program 3: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x19, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$CHAR_RAW_DISCARD(r0, 0x401012f7, &(0x7f00000000c0)) 21:46:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000024003d0f000000f6ffffffffffffff00", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff0000000008000100647272"], 0x2c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x30, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) 21:46:06 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x1c) [ 674.607266] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 21:46:07 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1f00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000024003d0f000000f6ffffffffffffff00", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff0000000008000100647272"], 0x2c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x30, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) 21:46:07 executing program 3: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}], 0x0, &(0x7f00000000c0)=ANY=[]) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x20, 0x0, 0xfa, 0x0, 0x8000, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x0, 0x8, 0x0, 0x0, 0x6, 0x3, 0x8, 0x0, 0x9, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x400000, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r1, r0, 0x80000) 21:46:07 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x1c) 21:46:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000024003d0f000000f6ffffffffffffff00", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff0000000008000100647272"], 0x2c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x30, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x2c, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) 21:46:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 674.865330] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.2'. 21:46:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:07 executing program 3: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r2, &(0x7f0000000900)={0x2c, 0x0, r1}, 0x10) ppoll(&(0x7f0000008100)=[{r2}], 0x1, &(0x7f0000008140), 0x0, 0x0) 21:46:07 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x1c) [ 674.982919] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:07 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0, 0x3b}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "083ff2", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 21:46:07 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000240)={0x0}, 0x1c) 21:46:07 executing program 3: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r2, &(0x7f0000000900)={0x2c, 0x0, r1}, 0x10) ppoll(&(0x7f0000008100)=[{r2}], 0x1, &(0x7f0000008140), 0x0, 0x0) 21:46:07 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:07 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c00000024003d0f000000f6ffffffffffffff00", @ANYRES32=r4, @ANYBLOB="00000000f1ffffff0000000008000100647272"], 0x2c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@delchain={0x30, 0x28, 0xf31, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xffff}}, [@filter_kind_options=@f_u32={{0x8}, {0x4}}]}, 0x30}}, 0x0) getsockname$packet(r3, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x1) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newqdisc={0x24, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0x4, 0xffff}}}, 0x24}}, 0x0) 21:46:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:07 executing program 0: syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x410100) 21:46:07 executing program 3: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r2, &(0x7f0000000900)={0x2c, 0x0, r1}, 0x10) ppoll(&(0x7f0000008100)=[{r2}], 0x1, &(0x7f0000008140), 0x0, 0x0) 21:46:07 executing program 0: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000340)="d4", 0x1}], 0x1, 0x0, 0x0) [ 675.563083] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:08 executing program 3: r0 = socket(0x100000000011, 0x2, 0x0) bind(r0, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f00000002c0)=0x14) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0x20000, 0x1000}, 0x18) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f00000004c0)=0x80, 0x4) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000080)=0x2, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) bind$xdp(r2, &(0x7f0000000900)={0x2c, 0x0, r1}, 0x10) ppoll(&(0x7f0000008100)=[{r2}], 0x1, &(0x7f0000008140), 0x0, 0x0) 21:46:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:08 executing program 2: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a09", 0xb, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x20, 0x0, 0xfa, 0x0, 0x8000, 0x0, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x2, 0x8, 0x0, 0x0, 0x6, 0x3, 0x8, 0x0, 0x9, 0x0, 0xfffffffffffffffc}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchown(r0, 0xee01, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000240), 0x400000, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x2) dup3(r1, r0, 0x80000) [ 675.673751] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. 21:46:08 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) times(&(0x7f0000000080)) 21:46:08 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2a, &(0x7f0000000080)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @remote}}}, 0x108) 21:46:08 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x80, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) dup2(0xffffffffffffffff, r0) 21:46:08 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x2300000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:08 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 21:46:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:08 executing program 5: prlimit64(0x0, 0x0, 0x0, &(0x7f00000000c0)) 21:46:08 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 21:46:08 executing program 0: msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000140)=""/4096) 21:46:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 21:46:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000000)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, 0xe8) 21:46:08 executing program 2: io_setup(0x8, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) 21:46:08 executing program 3: syz_open_dev$sg(&(0x7f0000000000), 0x6, 0x240) 21:46:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:08 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x28) 21:46:08 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3bba5cb900000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:08 executing program 3: r0 = syz_open_dev$binderN(&(0x7f00000019c0), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0189436, &(0x7f0000001240)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x0}) 21:46:08 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x220080, 0x0) openat$cgroup_subtree(r0, &(0x7f0000000080), 0x2, 0x0) 21:46:08 executing program 2: msgctl$MSG_STAT(0x0, 0xc, 0x0) 21:46:08 executing program 5: r0 = syz_open_dev$binderN(&(0x7f00000019c0), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc00c620f, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 21:46:09 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:09 executing program 3: r0 = syz_open_dev$binderN(&(0x7f00000019c0), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000001240)={0x4, 0x0, &(0x7f00000001c0)=[@register_looper={0x630c}], 0x0, 0x0, 0x0}) [ 676.603270] binder: 12003:12005 ioctl c00c620f 20001240 returned -22 21:46:09 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000e80), 0x84680, 0x0) 21:46:09 executing program 2: mount$fuseblk(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) 21:46:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001a00)={0x28, 0x1, 0x4, 0x301, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_MODE={0xa}]}, 0x28}}, 0x0) 21:46:09 executing program 3: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000002c0)={0x30}, 0x30) 21:46:09 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffff1f0000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:09 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x3f00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:09 executing program 3: msgctl$MSG_STAT(0x0, 0xc, &(0x7f0000000140)=""/4096) 21:46:09 executing program 2: sendmsg$NL80211_CMD_START_P2P_DEVICE(0xffffffffffffffff, 0x0, 0xf76f8fcaa01d5e49) 21:46:09 executing program 5: clock_nanosleep(0x0, 0x0, &(0x7f0000000140), 0x0) 21:46:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001a00)={0x28, 0x1, 0x4, 0x301, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_MODE={0xa}]}, 0x28}}, 0x0) 21:46:09 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff7f00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:09 executing program 2: socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$devlink(&(0x7f0000006ec0), 0xffffffffffffffff) 21:46:09 executing program 3: syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x800) 21:46:09 executing program 5: r0 = syz_open_dev$binderN(&(0x7f00000019c0), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 21:46:09 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:09 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001a00)={0x28, 0x1, 0x4, 0x301, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_MODE={0xa}]}, 0x28}}, 0x0) 21:46:09 executing program 3: syz_open_dev$sg(&(0x7f0000000000), 0x10001, 0x4000) [ 677.452450] __ntfs_warning: 187 callbacks suppressed [ 677.452461] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid end of sector marker. [ 677.477943] ntfs: (device loop4): ntfs_attr_find(): Inode is corrupt. Run chkdsk. [ 677.495650] ntfs: (device loop4): ntfs_read_inode_mount(): Failed to lookup attribute list attribute. You should run chkdsk. [ 677.522816] ntfs: (device loop4): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 677.535779] ntfs: (device loop4): ntfs_fill_super(): Failed to load essential metadata. [ 677.607777] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid end of sector marker. [ 677.618307] ntfs: (device loop4): ntfs_attr_find(): Inode is corrupt. Run chkdsk. [ 677.627365] ntfs: (device loop4): ntfs_read_inode_mount(): Failed to lookup attribute list attribute. You should run chkdsk. [ 677.668462] ntfs: (device loop4): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 677.684688] ntfs: (device loop4): ntfs_fill_super(): Failed to load essential metadata. 21:46:10 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x20601, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x4, 0x0, 0x91, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf66, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x136, 0x5, 0x2020, 0xb47, 0x20, 0x0, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 21:46:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001a00)={0x28, 0x1, 0x4, 0x301, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_MODE={0xa}]}, 0x28}}, 0x0) 21:46:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001a00)={0x2c, 0x1, 0x4, 0x301, 0x0, 0x0, {}, [@NFULA_CFG_TIMEOUT={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0xf075}]}, 0x2c}}, 0x0) 21:46:10 executing program 5: r0 = syz_open_dev$binderN(&(0x7f00000019c0), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 21:46:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001a00)={0x2c, 0x1, 0x4, 0x301, 0x0, 0x0, {}, [@NFULA_CFG_TIMEOUT={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0xf075}]}, 0x2c}}, 0x0) 21:46:10 executing program 0: openat$cachefiles(0xffffffffffffff9c, 0x0, 0x20000, 0x0) 21:46:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001a00)={0x2c, 0x1, 0x4, 0x301, 0x0, 0x0, {}, [@NFULA_CFG_TIMEOUT={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0xf075}]}, 0x2c}}, 0x0) 21:46:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:10 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$SCSI_IOCTL_START_UNIT(r0, 0x5) 21:46:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f0000001a00)={0x2c, 0x1, 0x4, 0x301, 0x0, 0x0, {}, [@NFULA_CFG_TIMEOUT={0x8}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_NLBUFSIZ={0x8, 0x3, 0x1, 0x0, 0xf075}]}, 0x2c}}, 0x0) 21:46:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:11 executing program 5: r0 = syz_open_dev$binderN(&(0x7f00000019c0), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 21:46:11 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:11 executing program 0: r0 = syz_open_dev$binderN(&(0x7f00000019c0), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0046209, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 21:46:11 executing program 2: r0 = syz_open_dev$binderN(&(0x7f00000019c0), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x40046210, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 21:46:11 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000015c0)={0x1, 0x28, &(0x7f0000001600)}, 0xfffffffffffffd68) [ 679.181779] binder: 12157:12161 ioctl 40046210 20001240 returned -22 21:46:11 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYRESHEX], 0xa4}}, 0x0) 21:46:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x20601, 0x0) gettid() perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x4, 0x0, 0x91, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf66, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x136, 0x5, 0x2020, 0xb47, 0x20, 0x0, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 21:46:11 executing program 0: r0 = syz_open_dev$binderN(&(0x7f00000019c0), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0046209, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 21:46:11 executing program 5: r0 = syz_open_dev$binderN(&(0x7f00000019c0), 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 21:46:11 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:11 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000000c0)='ns/ipc\x00') 21:46:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x4c00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000006ec0), r0) syz_genetlink_get_family_id$devlink(&(0x7f0000006ec0), 0xffffffffffffffff) 21:46:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:12 executing program 0: r0 = syz_open_dev$binderN(&(0x7f00000019c0), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0046209, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 21:46:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x20601, 0x0) gettid() perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x4, 0x0, 0x91, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf66, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x136, 0x5, 0x2020, 0xb47, 0x20, 0x0, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 21:46:12 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) read$FUSE(r0, &(0x7f0000000000)={0x2020}, 0x2020) 21:46:12 executing program 5: io_setup(0x8, &(0x7f0000000000)=0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x0, r1, 0x0}]) 21:46:12 executing program 0: r0 = syz_open_dev$binderN(&(0x7f00000019c0), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0046209, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 21:46:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:12 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r0, 0x2289, &(0x7f0000000080)) 21:46:12 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 21:46:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x55aaffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:12 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000600)='ns/pid_for_children\x00') 21:46:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x20601, 0x0) gettid() perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x4, 0x0, 0x91, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf66, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x136, 0x5, 0x2020, 0xb47, 0x20, 0x0, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 21:46:12 executing program 5: openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x10400, 0x0) 21:46:12 executing program 3: socket$inet6(0xa, 0x5, 0x101) 21:46:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:12 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={0x0}}, 0x0) 21:46:12 executing program 3: getresgid(&(0x7f0000005240), &(0x7f0000005280), &(0x7f00000052c0)) 21:46:12 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, 0x0) 21:46:13 executing program 0: r0 = getpgid(0x0) prlimit64(r0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 21:46:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x20601, 0x0) gettid() perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x4, 0x0, 0x91, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaf66, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x136, 0x5, 0x2020, 0xb47, 0x20, 0x0, 0x1, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 21:46:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:13 executing program 5: recvmsg$can_bcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x140) fork() 21:46:13 executing program 3: syz_open_dev$sg(&(0x7f0000000040), 0xffffffffffffffff, 0x0) 21:46:13 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x10b282, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000140)) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f00000000c0)=0x80) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x80045002, 0x0) 21:46:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:13 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6800000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:13 executing program 2: socketpair(0x2a, 0x0, 0x0, &(0x7f00000001c0)) 21:46:13 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f00000001c0)) 21:46:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x21, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x20601, 0x0) gettid() 21:46:13 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x10b282, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000140)) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f00000000c0)=0x80) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x80045002, 0x0) 21:46:13 executing program 2: openat$cachefiles(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000980), 0xffffffffffffffff) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 21:46:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'md4\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r1, r2, 0x0, 0x7ffff000) 21:46:14 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x10b282, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000140)) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f00000000c0)=0x80) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x80045002, 0x0) 21:46:14 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/5, 0xc000, 0x800}, 0x20) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000080)=0x40, 0x4) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000200)=0x80, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f00000001c0)=0x400, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000100)={0x2c, 0x0, r2}, 0x10) 21:46:14 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xff01, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:14 executing program 0: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x10b282, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000140)) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f00000000c0)=0x80) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x80045002, 0x0) 21:46:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x20601, 0x0) gettid() 21:46:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() tgkill(0x0, 0x0, 0x0) get_robust_list(r1, &(0x7f0000000280)=0x0, &(0x7f00000002c0)) 21:46:14 executing program 3: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000380)={0x1, @pix={0x0, 0x3e, 0x50424752}}) 21:46:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6c00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:14 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) 21:46:14 executing program 3: r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000080), 0x10b282, 0x0) ioctl$SNDCTL_DSP_SPEED(r0, 0xc0045002, &(0x7f0000000140)) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000040)) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f00000000c0)=0x80) ioctl$SNDCTL_DSP_SETTRIGGER(r0, 0x5001, 0x0) 21:46:14 executing program 0: setrlimit(0x4, &(0x7f0000000040)={0x0, 0x3}) setrlimit(0x2, &(0x7f00000001c0)={0x60000000, 0x60000000}) 21:46:14 executing program 2: setrlimit(0x4, &(0x7f0000000040)={0x0, 0x3}) 21:46:14 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xff0f, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:14 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r0, 0x80047462) 21:46:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x20601, 0x0) gettid() 21:46:15 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="8c0a6d9811a9d6ffbe51b323d3351ae0d95d17dbd41bf6515c71d8c8549e8db23576f20a1e4111f516c9af7ccb6b2ea68abc6252b46cb835d8a89fdd361d52a9fa21c605054cc66d73ed4480bcee267b17c4a8afb5ace171553667528ae088bb31e772bc225a6380e9504c5d92bb8fd101c1d0c82e8c4b71bef4ce468b41a2e3", 0x80}, {&(0x7f00000003c0)="08ef3e9e0d0b63bcb0ab3a4c67d043b2a7", 0x11}], 0x2}, 0x0) 21:46:15 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000340)="8c0a6d9811a9d6ffbe51b323d3351ae0d95d17dbd41bf6515c71d8c8549e8db23576f20a1e4111f516c9af7ccb6b2ea68abc6252b46cb835d8a89fdd361d52a9fa21c605054cc66d73ed4480bcee267b17c4a8afb5ace171553667528ae088bb31e772bc225a6380e9504c5d92bb8fd101c1d0c82e8c4b71bef4ce468b41a2e3", 0x80}, {&(0x7f00000003c0)="08ef3e9e0d0b63bcb0ab3a4c67d043b2a7", 0x11}], 0x2, &(0x7f0000001780)=[@rights], 0x10}, 0x0) 21:46:15 executing program 3: shmat(0x0, &(0x7f0000ffb000/0x2000)=nil, 0x0) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x0) 21:46:15 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000140)="762d180b678e406c3d89db7f47c417ee053155b4e5fc5889c9892cbf2592e58c80dc19fdd06566e36f9221cb16451a57fa170568a42a992a7875bac01df880e249d7a7693539221763080d1d4ca6bc555c17e9dfe74763ffa347bea47d46fb947a8c0610b5eeb0754d26cd599cdf4feec53c6793f08e35babb54b3dd9bcf8b0a804c79e2f334e90341f8a4950e3e96ce1bad2ddac86d07761649c9ed4529e7768f5b28f2214813a50faed4029168fb05c3a0370dce8174c2a15610ddf4c00c928f1eab604cd3b312eeb3dbee47ed568cb218720dd8ca1dd93e06e0651e47aab655", 0xe1) [ 683.034349] __ntfs_warning: 147 callbacks suppressed [ 683.034360] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 683.057352] ntfs: (device loop1): ntfs_read_inode_mount(): MST fixup failed. $MFT is corrupt. [ 683.140649] ntfs: (device loop1): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 683.154641] ntfs: (device loop1): ntfs_fill_super(): Failed to load essential metadata. [ 683.272306] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 683.281088] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 683.294190] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 683.397474] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 683.424764] ntfs: (device loop1): ntfs_read_inode_mount(): MST fixup failed. $MFT is corrupt. [ 683.440754] ntfs: (device loop1): ntfs_read_inode_mount(): Failed. Marking inode as bad. 21:46:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7400000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:15 executing program 2: madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x5) 21:46:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0), 0x20601, 0x0) gettid() 21:46:15 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001680)=[{0x0}, {&(0x7f00000003c0)="08ef3e9e0d0b63bcb0ab3a4c67d043b2a73224d7bcffc72ecf3222e7cb481778de52a63d0101d1009adccb2cecc4b8e9f54af9d6b28f490030a55693eb0ded0515bc1f14b81a42154a14e029a49f93b1fc8a3a4b845ab737f8c4397ede2388812ee7deaa81f6d0f79db7b3f232190c6cd5051a747b166378435e5781e14ea81b58b3061564ade547a91d588053c703f5c21b059781c9bfc4cf78ea9a99b9c9ae0b792e863a22e432c99e9e33e8fcf82a818b7c31973b4e125551d069", 0xbc}, {&(0x7f0000000480)="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", 0x6c8}], 0x3}, 0x0) 21:46:15 executing program 0: munmap(&(0x7f0000fff000/0x1000)=nil, 0x1000) 21:46:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb25904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:15 executing program 2: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000000)=""/202, &(0x7f0000000100)=0xca) 21:46:16 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:46:16 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fchown(r0, 0xffffffffffffffff, 0x0) 21:46:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb5290255446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:16 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCCONS(r0, 0x80047462) 21:46:16 executing program 2: socket$inet6(0x18, 0x7fff, 0x0) 21:46:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7a00000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:16 executing program 0: open(&(0x7f00000000c0)='.\x00', 0x1, 0x0) 21:46:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xa) 21:46:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e2546532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:16 executing program 2: chown(&(0x7f0000000040)='\x00', 0x0, 0x0) 21:46:16 executing program 3: ptrace(0x3, 0xffffffffffffffff) 21:46:16 executing program 5: semget(0x0, 0x1, 0x29a) 21:46:16 executing program 3: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000200)={{0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}}) 21:46:16 executing program 2: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)) 21:46:16 executing program 0: r0 = semget(0x0, 0x0, 0x0) semctl$SETVAL(r0, 0x3, 0x8, &(0x7f00000001c0)) 21:46:16 executing program 3: semctl$SETALL(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)=[0x0]) 21:46:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446252020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7fffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:16 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f00000017c0)={0x0, 0x0, 0x0}, 0x0) 21:46:16 executing program 2: clock_nanosleep(0x3b9ac9ff, 0x0, &(0x7f0000000080), 0x0) 21:46:16 executing program 3: clock_nanosleep(0xffc99a3b, 0x0, &(0x7f0000000080), 0x0) 21:46:16 executing program 0: getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) 21:46:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446530220202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:17 executing program 5: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000300)={{0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 21:46:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chown(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, 0x0) 21:46:17 executing program 2: sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) mlock(&(0x7f0000ff7000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 21:46:17 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$xdp(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x0) 21:46:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446530a20202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:17 executing program 5: clock_nanosleep(0xffffff7f, 0x0, &(0x7f0000000080), 0x0) 21:46:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8000000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:17 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000000280)={0x1}) fcntl$lock(r1, 0x26, &(0x7f0000000040)={0x1}) fcntl$lock(r1, 0x26, &(0x7f0000000080)={0x0, 0x0, 0x1}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) dup3(r0, r1, 0x0) 21:46:17 executing program 3: socket$inet6(0x18, 0x0, 0x1f) 21:46:17 executing program 0: semctl$SETALL(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)) 21:46:17 executing program 5: prctl$PR_SET_MM_MAP(0x15, 0xe, 0xfffffffffffffffc, 0x0) 21:46:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446530b20202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:17 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x20, 0x3f2}, 0x20}}, 0x0) 21:46:17 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000000c0)={0x0, {{0xa, 0x0, @multicast1}}}, 0x88) 21:46:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446531320202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:17 executing program 0: request_key(&(0x7f0000000180)='blacklist\x00', 0x0, 0x0, 0xffffffffffffffff) 21:46:17 executing program 2: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) select(0x40, &(0x7f0000000100)={0x3}, 0x0, 0x0, &(0x7f0000000200)={0x0, r0/1000+10000}) 21:46:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'syztnl2\x00', 0x0}) 21:46:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8703000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:17 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x5, &(0x7f0000000040)=@raw=[@generic, @initr0, @alu, @func], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:17 executing program 3: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) 21:46:17 executing program 2: setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev, 0x0, 0x0, 'lblc\x00'}, {@loopback}}, 0x44) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 21:46:17 executing program 5: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000a00)=@raw={'raw\x00', 0x3c1, 0x3, 0x310, 0x160, 0xffffff80, 0x178, 0x160, 0x178, 0x240, 0x258, 0x258, 0x206, 0x258, 0x3, 0x0, {[{{@ipv6={@mcast2, @mcast2, [], [], 'veth1_to_bond\x00', 'netpci0\x00'}, 0x0, 0x138, 0x160, 0x0, {}, [@common=@unspec=@quota={{0x38}}, @common=@inet=@hashlimit1={{0x58}, {'syzkaller1\x00', {0x0, 0x0, 0x0, 0x4d020000, 0x0, 0x5, 0xa6}}}]}, @common=@unspec=@CLASSIFY={0x28}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @remote}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'veth0_to_team\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x370) 21:46:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446531620202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000009f00)={0x0, 0x0, &(0x7f0000009ec0)={0x0}, 0x1, 0x0, 0x0, 0x801}, 0x0) 21:46:17 executing program 3: wait4(0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x20000000, 0x0) [ 685.563629] xt_hashlimit: size too large, truncated to 1048576 [ 685.578494] xt_hashlimit: overflow, try lower: 0/0 [ 685.593312] xt_hashlimit: size too large, truncated to 1048576 21:46:18 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89a3, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:18 executing program 0: socketpair(0x10, 0x0, 0x4, &(0x7f0000003800)) [ 685.611833] xt_hashlimit: overflow, try lower: 0/0 21:46:18 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={0x0}}, 0x0) 21:46:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532120202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8803000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:18 executing program 3: socket$inet(0x2, 0xa, 0x0) select(0x40, &(0x7f0000000100)={0x8}, 0x0, 0x0, &(0x7f0000000200)={0x0, 0x2710}) 21:46:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000002540)=ANY=[@ANYBLOB="0a000000000000000d00000002000000060000000700000000000000000000000000004002000000070000000800000000010000000000000100008008000000ffff0000080000000300000000000000010000c008000000010000000800000001800000000000000800008003000000ffff0000ff000000010000000000000001"]) 21:46:18 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{0x1, 0x4}}}, 0x10) 21:46:18 executing program 5: socket(0x10, 0x2, 0xfffffff8) 21:46:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532002202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:18 executing program 3: r0 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf={0x0, &(0x7f0000000000)}) 21:46:18 executing program 5: munmap(&(0x7f00003ff000/0xc00000)=nil, 0xc00000) 21:46:18 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) fcntl$dupfd(r0, 0x0, r0) 21:46:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653200a202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:18 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000180)=ANY=[], 0x10}}, 0x0) 21:46:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000004f00)=[{{0x0, 0x0, &(0x7f0000001540)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x2042, 0x0) 21:46:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8903000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:18 executing program 0: socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8946, &(0x7f0000001480)={'ip_vti0\x00', 0x0}) 21:46:18 executing program 2: r0 = socket(0x18, 0x0, 0x2) syz_genetlink_get_family_id$tipc2(&(0x7f0000002740), r0) 21:46:18 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 21:46:18 executing program 5: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000011c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, 0x0) 21:46:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653200b202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:18 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89a2, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:18 executing program 0: bpf$BPF_PROG_QUERY(0x13, 0x0, 0x0) 21:46:18 executing program 2: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) 21:46:19 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000480)={&(0x7f0000000340), 0x2000034c, &(0x7f0000000440)={0x0}}, 0x0) 21:46:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532013202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:19 executing program 3: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) fchown(r0, 0x0, 0x0) 21:46:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8a03000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:19 executing program 0: io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:46:19 executing program 5: socket$inet(0x2, 0xa, 0x0) select(0x40, &(0x7f0000000100)={0x8}, 0x0, 0x0, 0x0) 21:46:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xd8, &(0x7f0000000100)=""/216, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0), 0x8, 0x10, 0x0}, 0x78) 21:46:19 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'syztnl0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @empty}}) 21:46:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532016202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 686.958885] ieee802154 phy0 wpan0: encryption failed: -22 [ 686.964557] ieee802154 phy1 wpan1: encryption failed: -22 21:46:19 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x6, 0x0, 0x0) 21:46:19 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:19 executing program 3: syz_mount_image$tmpfs(0x0, &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x2, &(0x7f0000000940)=[{&(0x7f0000000480)='%', 0x1, 0xfffffffffffffffd}, {&(0x7f0000000740)="fa", 0x1, 0x100000001}], 0x0, 0x0) 21:46:19 executing program 0: socket(0x10, 0x0, 0x12) 21:46:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532021202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:19 executing program 2: epoll_pwait(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) 21:46:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8b03000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:19 executing program 3: r0 = socket(0x1e, 0x5, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x3, 0x0, 0x0) 21:46:20 executing program 5: keyctl$link(0x8, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 21:46:20 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000006c0), r0) 21:46:20 executing program 2: creat(&(0x7f0000000900)='./file0\x00', 0x0) mount$9p_virtio(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=v']) 21:46:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020022000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:20 executing program 3: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000001c0)) 21:46:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8c27000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:20 executing program 0: socket$inet6(0xa, 0x1, 0x1000) [ 687.969032] 9pnet: Could not find request transport: v 21:46:20 executing program 2: sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(0xffffffffffffffff, 0x0, 0x0) 21:46:20 executing program 5: mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xc) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 21:46:20 executing program 3: pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)) [ 688.102386] __ntfs_error: 140 callbacks suppressed [ 688.102399] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:46:20 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000000)='syzkaller\x00', &(0x7f0000000040)='\\*/{&-\\[+A\x00') 21:46:20 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0xffffffff80000001, 0x3e1b00) [ 688.143627] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:46:20 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='uni_xlate=1,fowner>']) 21:46:20 executing program 5: r0 = socket(0x10, 0x2, 0x0) getpeername$inet(r0, 0x0, &(0x7f0000000040)) [ 688.251708] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:46:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320200a2000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f00000024c0)) 21:46:20 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000a80)={&(0x7f00000009c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x18}, 0x18}}, 0x0) [ 688.419333] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 688.428276] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 688.459997] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 688.476459] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 688.501379] ntfs: (device loop1): ntfs_read_inode_mount(): MST fixup failed. $MFT is corrupt. [ 688.536815] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 688.545980] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:46:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x8cffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:21 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x464, 0x4}, 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000002680)=[{{&(0x7f00000000c0)=@ax25={{0x3, @rose}, [@remote, @remote, @rose, @default, @remote, @bcast, @netrom, @bcast]}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000002740)) 21:46:21 executing program 3: prctl$PR_SET_MM_MAP(0xd, 0xe, 0xfffffffffffffffc, 0x0) 21:46:21 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x802c0, 0x0) 21:46:21 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB='nr_inodes=x', @ANYBLOB=',defcontext=staff_u,obj_role=', @ANYBLOB=',fsname=utf8=1,seclabel,']) 21:46:21 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320200b2000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:21 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x21, 0x0, 0x0) 21:46:21 executing program 5: syz_open_dev$vcsu(&(0x7f0000001300), 0x0, 0xa20c0) 21:46:21 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) socket$netlink(0x10, 0x3, 0x2) 21:46:21 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, 0x0, 0x0) 21:46:21 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x464, 0x4}, 0x10}}, 0x0) clock_gettime(0x0, &(0x7f0000002700)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000002500)=[{0xfffffffffffffffd}], 0x1}}], 0x2, 0x0, &(0x7f0000002740)={0x0, r1+60000000}) 21:46:21 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020132000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x97ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:21 executing program 0: r0 = socket(0xa, 0x2, 0x0) bind$xdp(r0, &(0x7f0000002a00)={0xa}, 0x10) 21:46:21 executing program 5: accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x81000) 21:46:21 executing program 2: syz_open_dev$vcsu(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x9, 0x1ff, 0x5, 0x27c6, 0x12, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 21:46:21 executing program 3: getresuid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) 21:46:21 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020162000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:21 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x3, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:21 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020212000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:21 executing program 5: socket$inet(0x2, 0x8040d, 0x0) 21:46:21 executing program 3: statx(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00', 0x0, 0x0) 21:46:21 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB=',defcontext=staff_u,o']) 21:46:21 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@func]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 689.620314] tmpfs: Bad mount option defcontext 21:46:22 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9b27000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:22 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:22 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000006300)) 21:46:22 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020200200020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:22 executing program 0: select(0x9, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200)={0x77359400}) 21:46:22 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r0, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000600)={0x0}}, 0x0) 21:46:22 executing program 3: socket(0xa, 0x2, 0x11) 21:46:22 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000040)) 21:46:22 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='m']) 21:46:22 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020200a00020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:22 executing program 3: socketpair(0x2, 0x2, 0x11, &(0x7f0000003800)) [ 690.273321] tmpfs: No value for mount option 'm' 21:46:22 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000040)) [ 690.304370] tmpfs: No value for mount option 'm' 21:46:22 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x9, 0x0, 0x3, 0x0, 0x1}, 0x40) 21:46:22 executing program 3: socketpair(0x1, 0x0, 0x2fd, &(0x7f0000000040)) 21:46:22 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000040)) 21:46:22 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf5ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:23 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x5, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:23 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020200b00020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:23 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000003e80), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000099c0), 0x0, 0x0) 21:46:23 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGETNODEID(r0, 0x89e1, &(0x7f0000000040)) 21:46:23 executing program 3: accept(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) 21:46:23 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xf6ffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:23 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x37, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:23 executing program 0: epoll_create(0x4) 21:46:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f00000013c0), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000006e80), r0) 21:46:23 executing program 2: r0 = socket$pppl2tp(0x18, 0x1, 0x1) setsockopt$sock_int(r0, 0x300, 0x0, 0x0, 0x0) 21:46:23 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020201300020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:23 executing program 3: io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r0, 0x0, 0x0) 21:46:23 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8912, 0x0) 21:46:23 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x1e, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:23 executing program 5: bpf$BPF_PROG_QUERY(0x15, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 21:46:23 executing program 2: setrlimit(0x7, &(0x7f0000000000)) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) 21:46:23 executing program 0: bpf$BPF_PROG_QUERY(0x4, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 21:46:23 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x4, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:23 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020201600020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:23 executing program 2: setrlimit(0x7, &(0x7f0000000000)) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) 21:46:23 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='mode=000']) 21:46:23 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfbffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:23 executing program 0: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000100)=""/197, 0xc5}], 0x1}, 0x0) 21:46:24 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202100020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:24 executing program 2: setrlimit(0x7, &(0x7f0000000000)) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) 21:46:24 executing program 5: prctl$PR_SET_MM_MAP(0x21, 0xe, 0xfffffffffffffffc, 0x0) 21:46:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback}}) 21:46:24 executing program 2: setrlimit(0x7, &(0x7f0000000000)) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) 21:46:24 executing program 3: getresuid(&(0x7f0000000a00), 0x0, 0x0) 21:46:24 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020208503020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:24 executing program 5: io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f00000004c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000002580)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x0, r1, 0x0}]) 21:46:24 executing program 2: setitimer(0x1, &(0x7f0000000000)={{0x0, 0xea60}}, 0x0) setitimer(0x1, 0x0, &(0x7f0000000180)) 21:46:24 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000240)) 21:46:24 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfcfdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000002540)=ANY=[@ANYBLOB="0a000000000000000000000002000000060000000700000000000000000000000700000002000000070000100000000000010000000000000100008008000000ffff0000080000000300000000000000010000c008000000010000000800000001800000000000000800008003000000ffff0000ff0000000100000000000000010000000400000007000000b2"]) 21:46:24 executing program 0: mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x100000a) 21:46:24 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x59ca, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 21:46:24 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000040)=@framed={{}, [@initr0, @jmp, @func, @initr0, @map_val]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:24 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020208703020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:24 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdfdffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:24 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x3}, 0x0) 21:46:25 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x1a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:25 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x12, 0x0, 0x0) 21:46:25 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000007800), 0x0, 0x0) 21:46:25 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x4, 0x0, 0x0) 21:46:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020208803020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:25 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000900), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x1, 0x3, 0x7f, 0x8, 0x0, 0x1, 0x0, '\x00', 0x0, r0, 0x0, 0x3}, 0x40) 21:46:25 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000d80), 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0x0) 21:46:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x16, 0x0, 0x0, 0x3, 0x0, 0x1}, 0x40) 21:46:25 executing program 2: mlock(&(0x7f0000ff7000/0x2000)=nil, 0x2000) pkey_mprotect(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0xffffffffffffffff) 21:46:25 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000100)=""/197, 0xc5}], 0x1}, 0x40000161) [ 693.138033] __ntfs_error: 129 callbacks suppressed [ 693.138046] ntfs: (device loop1): ntfs_read_inode_mount(): MST fixup failed. $MFT is corrupt. [ 693.163702] ntfs: (device loop1): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 693.173795] ntfs: (device loop1): ntfs_fill_super(): Failed to load essential metadata. 21:46:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020208903020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:25 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:25 executing program 0: syz_genetlink_get_family_id$nbd(&(0x7f0000000b80), 0xffffffffffffffff) 21:46:25 executing program 2: mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1cf8b000, 0x0, &(0x7f0000ff3000/0x2000)=nil) 21:46:25 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfdffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:25 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) [ 693.222048] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 693.239538] ntfs: (device loop1): ntfs_read_inode_mount(): MST fixup failed. $MFT is corrupt. [ 693.249476] ntfs: (device loop1): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 693.260473] ntfs: (device loop1): ntfs_fill_super(): Failed to load essential metadata. 21:46:25 executing program 0: socketpair(0x28, 0x0, 0x0, &(0x7f0000006240)) 21:46:25 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) [ 693.401204] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:46:25 executing program 2: bpf$BPF_PROG_QUERY(0x13, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 21:46:25 executing program 5: mlock(&(0x7f0000ff1000/0xf000)=nil, 0xf000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ff3000/0x2000)=nil) [ 693.450202] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 693.502053] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:46:25 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0xb, r0, 0x0) 21:46:25 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020208a03020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:26 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}, 0x3}, 0x0) 21:46:26 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x9, 0x1ff, 0x5, 0x27c6, 0x12, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 21:46:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) 21:46:26 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:26 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfeffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020208b03020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:26 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)) 21:46:26 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000001380)={0x1, &(0x7f0000001340)=[{0x2}]}) 21:46:26 executing program 3: bpf$BPF_PROG_QUERY(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 21:46:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020208c03020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:26 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x43, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:26 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x4, r0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) 21:46:26 executing program 0: io_destroy(0x0) io_setup(0x5, &(0x7f0000000000)) 21:46:26 executing program 3: r0 = epoll_create1(0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) 21:46:26 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x3c, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020208d03020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:27 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xff0f000000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:27 executing program 5: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="a0", 0x1, r0) add_key$keyring(&(0x7f0000000280), 0x0, 0x0, 0x0, r1) 21:46:27 executing program 3: mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x6) 21:46:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020a803020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:27 executing program 0: socket$bt_rfcomm(0x10, 0x0, 0x3) 21:46:27 executing program 2: mlock(&(0x7f0000ff7000/0x2000)=nil, 0x2000) pkey_mprotect(&(0x7f0000ff7000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) mlock2(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0) 21:46:27 executing program 0: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000080)={[0x7]}, 0x8) 21:46:27 executing program 2: r0 = socket(0xa, 0x2, 0x0) bind$xdp(r0, &(0x7f0000002a00)={0x2, 0xa}, 0x10) 21:46:27 executing program 5: r0 = socket(0x2, 0x2, 0x0) bind$xdp(r0, &(0x7f0000002a00)={0x2}, 0x10) 21:46:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020206022020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:27 executing program 3: pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) fremovexattr(r0, &(0x7f0000000040)=@random={'system.', '}/,\x00'}) 21:46:27 executing program 3: prctl$PR_SET_MM_MAP(0x25, 0xe, 0xfffffffffffffffc, 0x0) 21:46:27 executing program 5: mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 21:46:27 executing program 0: syz_open_dev$vcsa(&(0x7f0000000000), 0x52, 0x10000) 21:46:27 executing program 2: socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89e0, &(0x7f0000001480)={'ip_vti0\x00', 0x0}) 21:46:27 executing program 3: sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) mlock(&(0x7f0000ff7000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0) munmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000) 21:46:27 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffff1f0000000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020205526020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:27 executing program 3: r0 = socket(0x18, 0x0, 0x2) getpeername$inet(r0, 0x0, 0x0) 21:46:27 executing program 0: sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) mlock(&(0x7f0000ff7000/0x2000)=nil, 0x2000) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ff3000/0x2000)=nil) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 21:46:27 executing program 2: socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89e0, &(0x7f0000001480)={'ip_vti0\x00', 0x0}) 21:46:27 executing program 5: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{0x0}, {0x0}], 0x0, &(0x7f0000000980)=ANY=[@ANYRESDEC=0x0]) 21:46:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020203b27020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:27 executing program 3: setfsuid(0xee01) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 21:46:27 executing program 2: socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89e0, &(0x7f0000001480)={'ip_vti0\x00', 0x0}) [ 695.474524] FAT-fs (loop5): Unrecognized mount option "00000000000000000000" or missing value 21:46:27 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) [ 695.568841] FAT-fs (loop5): Unrecognized mount option "00000000000000000000" or missing value 21:46:28 executing program 2: socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89e0, &(0x7f0000001480)={'ip_vti0\x00', 0x0}) 21:46:28 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, 0x0, 0x0) 21:46:28 executing program 3: statx(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) 21:46:28 executing program 0: io_setup(0x1ff, &(0x7f0000000580)) 21:46:28 executing program 5: add_key$fscrypt_v1(&(0x7f0000000780), &(0x7f00000007c0)={'fscrypt:', @desc3}, &(0x7f0000000800)={0x0, "c7c949dde82ecce69a7584209ab70297d18005adc501bb8c68fa7f0669156ac226bb713d7e6a49672f6fdb0da364ac2fd4bf17b5dc410177650bc3c95463c57f"}, 0x48, 0x0) 21:46:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020b027020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:28 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffff7f00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:28 executing program 2: socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89a1, &(0x7f0000001480)={'ip_vti0\x00', 0x0}) 21:46:28 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x8, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:28 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003600)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 21:46:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000009f00)={&(0x7f0000009c40), 0xc, &(0x7f0000009ec0)={&(0x7f0000009c80)={0x14}, 0x14}}, 0x0) 21:46:28 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffd000/0x2000)=nil) 21:46:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202004000800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:28 executing program 3: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000006100)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:28 executing program 5: prctl$PR_SET_MM_MAP(0x1a, 0xe, 0xfffffffffffffffc, 0x0) 21:46:28 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f0000000a00)={0x18}, 0x18}}, 0x0) 21:46:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$xdp(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x10}, 0x0) 21:46:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ff3000/0x2000)=nil) 21:46:29 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffff00000000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202002020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:29 executing program 3: select(0x9, &(0x7f0000000100), &(0x7f0000000140)={0x8}, &(0x7f0000000180), &(0x7f0000000200)={0x77359400}) 21:46:29 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) select(0x40, &(0x7f0000000100)={0x8}, 0x0, 0x0, &(0x7f0000000200)) 21:46:29 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 21:46:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ff3000/0x2000)=nil) 21:46:29 executing program 3: add_key(&(0x7f0000000040)='blacklist\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 21:46:29 executing program 5: socketpair(0x5, 0x0, 0x0, &(0x7f0000002400)) 21:46:29 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) 21:46:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202003020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ff3000/0x2000)=nil) 21:46:29 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000007800), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x66000, 0x0) 21:46:29 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffffffff0700, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:29 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x9}, 0x20}}, 0x0) 21:46:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x67, 0x0, &(0x7f0000000040)) 21:46:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ff3000/0x2000)=nil) 21:46:29 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000080)="5caccd8d5b7c41a000", 0x9, 0x8}, {&(0x7f0000000440)="13aacc54a3bb389823baf78688f2f8e6d6f265a7ea0ecebd95effa166d11971298eadcefdabaf4fabd40863a8b1943dcab74e0bb9bcd937bca3a275e5e21ccc7e9856e329e3c08cd21b84ebf9dec040d6f8326d8c914218fd504c27843034c", 0x5f}], 0x0, 0x0) 21:46:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202004020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:29 executing program 2: syz_mount_image$vfat(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x0, &(0x7f0000000c40)={[{@shortname_mixed}, {@numtail}, {@shortname_winnt}, {@fat=@errors_remount}], [{@euid_gt}, {@context={'context', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) 21:46:29 executing program 3: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0xe, 0x0, 0x0) 21:46:29 executing program 0: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockname$tipc(r0, &(0x7f0000000380), &(0x7f00000003c0)=0x10) 21:46:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000100)=@buf={0x50, &(0x7f0000000000)="12f255e735945e13d55daeaf3dc076d586dc20766886439d6ef41be89a6521660f080f313169ae7e10ad24b6b8b27040fde4f34e35f51fd1b9cf4d929af56c0fae77014d6535036082e4fd29c4e1354f"}) 21:46:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202005020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:29 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000000)={@loopback, @multicast1}, 0x8) 21:46:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000002380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f00000024c0)) 21:46:30 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000640)={0x10, 0x464, 0x4}, 0x10}}, 0x0) clock_gettime(0x0, &(0x7f0000002700)) recvmmsg(r0, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) 21:46:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffffffffff7f, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:30 executing program 5: mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 21:46:30 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x12, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:30 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202006020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:30 executing program 5: socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89e1, 0x0) 21:46:30 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202007020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:30 executing program 3: add_key$keyring(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x3ff}) 21:46:30 executing program 5: sendmsg$IEEE802154_SCAN_REQ(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SCAN_REQ(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0}, 0x0) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_LIST_SECLEVEL(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x0, 0x0, 0x25dfdbfc, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x24000844) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wpan1\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'wpan0\x00'}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r2, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000480)={0x0}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) sendmsg$IEEE802154_LLSEC_SETPARAMS(r2, 0x0, 0x20014000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$IEEE802154_LIST_IFACE(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40840}, 0x81) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, r3) 21:46:30 executing program 3: r0 = socket(0x18, 0x0, 0x2) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:46:30 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000440)="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", 0xbc1, 0x7fffffff}, {&(0x7f0000000100)="9a", 0x1}], 0x0, 0x0) [ 698.142862] __ntfs_warning: 109 callbacks suppressed [ 698.142874] ntfs: (device loop4): is_boot_sector_ntfs(): Invalid end of sector marker. [ 698.196626] ntfs: (device loop4): ntfs_fill_super(): Unable to set device block size to sector size (519). [ 698.328888] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 698.337393] ntfs: (device loop1): ntfs_read_inode_mount(): MST fixup failed. $MFT is corrupt. [ 698.354448] ntfs: (device loop1): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 698.364258] ntfs: (device loop1): ntfs_fill_super(): Failed to load essential metadata. [ 698.449674] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 698.460332] ntfs: (device loop1): ntfs_read_inode_mount(): MST fixup failed. $MFT is corrupt. [ 698.471418] ntfs: (device loop1): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 698.481491] ntfs: (device loop1): ntfs_fill_super(): Failed to load essential metadata. 21:46:31 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x20}, 0x20000320}}, 0x0) 21:46:31 executing program 5: io_pgetevents(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100), 0x8}) 21:46:31 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x2010, r0, 0x0) 21:46:31 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202008020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:31 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8936, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:31 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x60, &(0x7f0000000340)) 21:46:31 executing program 5: socket(0x10, 0x0, 0x5) 21:46:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x10001, 0xc4, &(0x7f0000000080)=""/196, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:31 executing program 0: mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1d272000, 0x3, &(0x7f0000ffd000/0x2000)=nil) 21:46:31 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202009020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:31 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0x14, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 21:46:31 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000080)=0x4) 21:46:31 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={0x0, 0xf0ff7f}}, 0x0) 21:46:31 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x3}, 0x0, 0x0, r3) 21:46:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x0, &(0x7f0000000c40)={[{@shortname_mixed}]}) 21:46:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:31 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000080)=0x4) 21:46:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast1}, 0x10) 21:46:31 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202013020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:31 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)) 21:46:31 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x49, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:31 executing program 5: creat(&(0x7f0000000900)='./file0\x00', 0x0) creat(&(0x7f0000000900)='./file0\x00', 0x0) 21:46:31 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4$inet(r0, 0x0, 0x0, 0x0) 21:46:31 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202021020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x1, 0x2, 0x0, 0x0, 0xfffffffffffffff0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, @jmp={0x5, 0x0, 0x2, 0x0, 0xb, 0xc, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x100}]}, &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xd8, &(0x7f0000000100)=""/216, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0x4, 0x3, 0x96}, 0x10}, 0x78) 21:46:32 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000080)=0x4) 21:46:32 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x14, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:32 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mode}, {@mode}, {@mpol={'mpol', 0x3d, {'bind', '=static', @val={0x3a, [0x35, 0x2f, 0x1b]}}}}], [{@seclabel}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x32, 0x32]}}}, {@fsmagic}]}) 21:46:32 executing program 2: accept4$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x0) getresuid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000a80)) 21:46:32 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000040), &(0x7f0000000080)=0x4) 21:46:32 executing program 5: bpf$BPF_PROG_QUERY(0xd, &(0x7f0000000180)={0xffffffffffffffff, 0xd, 0x0, 0x0, 0x0}, 0x20) 21:46:32 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202023020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:32 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) 21:46:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8913, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:32 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x3a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:32 executing program 3: ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) accept(0xffffffffffffffff, 0x0, &(0x7f0000000300)) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f00000007c0)=[{0x0}, {&(0x7f0000000600), 0x0, 0x1f}], 0x4000, &(0x7f0000000980)=ANY=[@ANYRESDEC=0x0]) [ 700.104392] tmpfs: Bad value 'bind=static:5/' for mount option 'mpol' [ 700.127340] tmpfs: Bad value 'bind=static:5/' for mount option 'mpol' 21:46:32 executing program 5: setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000000), 0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) 21:46:32 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202048020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:32 executing program 0: keyctl$unlink(0x6, 0x0, 0x0) 21:46:32 executing program 2: socket(0x10, 0x0, 0xe) 21:46:32 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x4, r0, 0x0) 21:46:32 executing program 5: syz_open_dev$vcsa(&(0x7f0000000440), 0x10000, 0x82e81) 21:46:32 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020204c020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:33 executing program 3: pipe(&(0x7f00000008c0)) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) 21:46:33 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x10, r0, 0x0) 21:46:33 executing program 2: mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xc) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 21:46:33 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) select(0x40, &(0x7f0000000100)={0x8}, 0x0, 0x0, 0x0) 21:46:33 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202068020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:33 executing program 3: socketpair(0xa, 0x2, 0x11, &(0x7f0000003800)) 21:46:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:33 executing program 2: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000340)='./file0\x00', 0x605, 0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x8}], 0x0, &(0x7f0000000240)={[{@nonumtail}, {@shortname_lower}, {@shortname_winnt}], [{@euid_lt={'euid<', 0xee01}}, {@obj_user}]}) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000005100), 0xc0000) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000300)) 21:46:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f00000001c0)={'gre0\x00', 0x0}) 21:46:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x18}, 0x1, 0x0, 0x5000}, 0x0) 21:46:33 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x3c, 0x0, 0x0) 21:46:33 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020206c020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:33 executing program 0: prctl$PR_SET_MM_MAP(0x16, 0xe, 0xfffffffffffffffc, 0x0) 21:46:33 executing program 3: r0 = socket(0x11, 0x3, 0x0) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={0x0}}, 0x0) 21:46:33 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f0000000080)) 21:46:33 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202074020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:33 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000080)="5caccd8d5b7c41a000", 0x9, 0x8}], 0x0, 0x0) 21:46:33 executing program 0: mremap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ff3000/0x2000)=nil) 21:46:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xf, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:34 executing program 3: clock_gettime(0x0, &(0x7f00000001c0)={0x0}) select(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x2}, 0x0, &(0x7f0000000200)={r0}) 21:46:34 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8916, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:34 executing program 2: keyctl$unlink(0x19, 0x0, 0x0) 21:46:34 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000300), &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB='nr_inodes=x', @ANYBLOB=',defcontext=staff_u,obj_role=,fowner=', @ANYBLOB=',fsname=utf8=1,']) 21:46:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020207a020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:34 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockname$tipc(r0, &(0x7f0000000080), &(0x7f0000001100)=0x10) 21:46:34 executing program 5: sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) mlock(&(0x7f0000ff7000/0x2000)=nil, 0x2000) mlock2(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ff3000/0x2000)=nil) 21:46:34 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x9, 0x1ff, 0x5, 0x27c6}, 0x40) 21:46:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000030800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:34 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)={0xf10, 0x453, 0x0, 0x0, 0x0, "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", ["", ""]}, 0xf10}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) [ 701.844153] tmpfs: Bad value 'x' for mount option 'nr_inodes' 21:46:34 executing program 0: mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffd000/0x2000)=nil) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 21:46:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:34 executing program 5: prctl$PR_SET_MM_MAP(0x2b, 0xe, 0xfffffffffffffffc, 0x0) 21:46:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 21:46:34 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x0, 0x0) getsockopt$inet6_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 21:46:34 executing program 0: select(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x2}, 0x0, 0x0) 21:46:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000070800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:34 executing program 2: bpf$BPF_PROG_QUERY(0x16, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 21:46:34 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x29, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:34 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x300, 0x0, 0x0, 0x0) 21:46:34 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xd8, &(0x7f0000000100)=""/216, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000300), 0x10}, 0x78) 21:46:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000f0800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:34 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000), 0xff, 0x22042) 21:46:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x14, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:35 executing program 0: pipe(&(0x7f0000001100)={0xffffffffffffffff}) accept(r0, 0x0, 0x0) 21:46:35 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000001200), 0x0, 0x200000) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, 0x0, 0x0) 21:46:35 executing program 5: r0 = socket(0x10, 0x2, 0x6) syz_genetlink_get_family_id$gtp(&(0x7f0000000040), r0) 21:46:35 executing program 2: socketpair(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x54) 21:46:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000140800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:35 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_SEC_DEV(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 21:46:35 executing program 0: socketpair(0x0, 0x0, 0x0, &(0x7f0000006240)) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000580)) 21:46:35 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000001c0)={'filter\x00', 0x4, "cf070a45"}, &(0x7f0000000100)=0x28) 21:46:35 executing program 3: mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0xfff, 0xffffffffffffffff, 0x0) 21:46:35 executing program 3: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)) 21:46:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020001f0800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 703.202120] __ntfs_error: 113 callbacks suppressed [ 703.202133] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 703.246641] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 703.260855] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 703.326915] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 703.336720] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 703.349429] ntfs: (device loop1): ntfs_read_inode_mount(): MST fixup failed. $MFT is corrupt. [ 703.372296] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 703.386793] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 703.388432] ntfs: (device loop1): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 703.405584] ntfs: (device loop1): ntfs_fill_super(): Failed to load essential metadata. 21:46:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xff01, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:35 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000340)='./file0\x00', 0x605, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000440)="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", 0x899}], 0x0, &(0x7f0000000240)={[{@nonumtail}, {@shortname_lower}, {@shortname_winnt}], [{@euid_lt={'euid<', 0xee01}}, {@obj_user}, {@euid_eq={'euid', 0x3d, 0xee00}}]}) accept(0xffffffffffffffff, 0x0, &(0x7f00000050c0)) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000005100), 0x0) 21:46:35 executing program 5: r0 = socket(0xa, 0x2, 0x0) bind$xdp(r0, &(0x7f0000002a00)={0xa}, 0x18) 21:46:35 executing program 3: socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8943, &(0x7f0000001480)={'ip_vti0\x00', 0x0}) 21:46:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback}}) 21:46:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000200800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:36 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x21, &(0x7f0000000140)=0x8000, 0x4) 21:46:36 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x32, 0x0, 0x0) 21:46:36 executing program 0: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) fork() 21:46:36 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@mode}, {@mode}, {@size={'size', 0x3d, [0x31, 0x31, 0x0]}}]}) 21:46:36 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x9effffff}, 0x0) 21:46:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000210800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:36 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0, 0x10}}, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_TTY(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={0x0}}, 0x0) 21:46:36 executing program 3: syz_mount_image$vfat(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x0, &(0x7f0000000c40)={[{@numtail}, {@iocharset={'iocharset', 0x3d, 'cp437'}}, {@shortname_winnt}, {@fat=@errors_remount}], [{@euid_gt}, {@context={'context', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) 21:46:36 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x40001) 21:46:36 executing program 5: clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) select(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x2}, 0x0, &(0x7f0000000200)={0x0, r0/1000+10000}) 21:46:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xff0f, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000400800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:36 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000800)={0xed0, 0x453, 0x0, 0x0, 0x0, "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", ["", ""]}, 0xed0}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) 21:46:36 executing program 0: setitimer(0x0, &(0x7f0000000000)={{}, {0x77359400}}, 0x0) getitimer(0x0, &(0x7f0000000b80)) 21:46:36 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0) 21:46:36 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x39}, 0x0) 21:46:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000030800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:37 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x2f, 0x0, 0x0) 21:46:37 executing program 0: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) io_setup(0x5, &(0x7f0000000000)) 21:46:37 executing program 2: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ff3000/0x2000)=nil) msync(&(0x7f0000fea000/0xc000)=nil, 0xc000, 0x2) 21:46:37 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x88, 0x2a, 0x0, 0x0) 21:46:37 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp={0x5, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xd8, &(0x7f0000000100)=""/216, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb25904e5446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:37 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001440), 0x0, &(0x7f0000001500)={[{@mode}, {@mode}, {@size={'size', 0x3d, [0x31, 0x31, 0x0]}}], [{@seclabel}, {@obj_role={'obj_role', 0x3d, '%@\'\''}}, {@appraise_type}, {@pcr={'pcr', 0x3d, 0x8}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x0, 0x32, 0x66, 0x35, 0x32, 0x35, 0x38], 0x2d, [0x64, 0x66, 0x36, 0x61], 0x2d, [0x0, 0x30, 0x62, 0x62], 0x2d, [0x66, 0x0, 0x0, 0x66], 0x2d, [0x33, 0x52, 0x0, 0x66, 0x0, 0x0, 0x0, 0x36]}}}]}) 21:46:37 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000040800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:37 executing program 0: io_destroy(0x0) io_setup(0x0, 0x0) 21:46:37 executing program 2: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ff3000/0x2000)=nil) msync(&(0x7f0000fea000/0xc000)=nil, 0xc000, 0x2) 21:46:37 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@map_val={0x18, 0x0, 0x2, 0x0, r0}]}, &(0x7f00000000c0)='GPL\x00', 0x1, 0xe1, &(0x7f0000000100)=""/225, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:37 executing program 2: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ff3000/0x2000)=nil) msync(&(0x7f0000fea000/0xc000)=nil, 0xc000, 0x2) 21:46:37 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$inet(r0, 0x0, 0x0) 21:46:37 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000070800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:37 executing program 0: mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) pipe(&(0x7f0000000040)) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) 21:46:37 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x10, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:37 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 21:46:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb5290255446532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:38 executing program 5: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001240)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000800)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x0, r1, &(0x7f00000000c0)}]) 21:46:38 executing program 2: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ff3000/0x2000)=nil) msync(&(0x7f0000fea000/0xc000)=nil, 0xc000, 0x2) 21:46:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x891f, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000080)=ANY=[]}) 21:46:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000080800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:38 executing program 3: pipe(&(0x7f0000001100)) 21:46:38 executing program 0: socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f0, &(0x7f0000001480)={'ip_vti0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="69705f7674693000000000000000000004f13c9c7fed3c"]}) 21:46:38 executing program 3: bpf$BPF_PROG_QUERY(0x9, 0x0, 0x0) 21:46:38 executing program 2: pipe(&(0x7f0000003e00)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r0, &(0x7f0000003e40)={[{0x0, 'io'}]}, 0x4) 21:46:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000f0800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:38 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000008c0), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000900)) 21:46:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e2546532020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:38 executing program 0: socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8913, &(0x7f0000001480)={'ip_vti0\x00', 0x0}) 21:46:38 executing program 3: keyctl$unlink(0xe, 0x0, 0x0) 21:46:38 executing program 2: setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x6266404b9754c318) 21:46:38 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000008c0), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000900)) 21:46:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000100800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:38 executing program 2: mlock(&(0x7f0000ff7000/0x2000)=nil, 0x2000) munmap(&(0x7f0000ff7000/0x4000)=nil, 0x4000) 21:46:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000140800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:38 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000017c0)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000003500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 21:46:38 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000008c0), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000900)) 21:46:38 executing program 3: r0 = socket(0xa, 0x2, 0x0) bind$xdp(r0, &(0x7f0000000180)={0x2, 0x4, 0x0, 0x3a, r0}, 0x10) 21:46:38 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000240)) 21:46:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446252020202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:39 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, 0x0) 21:46:39 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000008c0), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000900)) 21:46:39 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x31, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:39 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, r0) 21:46:39 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000210800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0xc, 0x0, &(0x7f0000000040)) 21:46:39 executing program 3: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmsg$tipc(r0, &(0x7f00000000c0)={&(0x7f0000000000)=@name={0x1e, 0x4}, 0x10, 0x0}, 0x0) 21:46:39 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x11, 0x1, &(0x7f0000000040)=@raw=[@ldst], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:39 executing program 0: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000180)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) sendmsg$FOU_CMD_ADD(r0, 0x0, 0x0) 21:46:39 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020200000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000001380)={0x2, &(0x7f0000001340)=[{}, {0x2, 0x0, 0x0, 0x47e}]}) 21:46:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446530b20202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:39 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001440), 0x0, &(0x7f0000001500)={[{@mode}, {@size={'size', 0x3d, [0x31, 0x31, 0x70]}}], [{@seclabel}, {@obj_user}]}) 21:46:39 executing program 5: statx(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'eth\x00'}}]}}) 21:46:39 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001240)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='thermal_power_devfreq_get_power\x00', r0}, 0x10) 21:46:39 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x21, &(0x7f0000000140), 0x4) 21:46:39 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020300000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:39 executing program 3: r0 = socket(0xa, 0x2, 0x0) bind$xdp(r0, &(0x7f0000002a00)={0x2, 0x8}, 0x10) 21:46:39 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LIST(r0, &(0x7f00000006c0)={&(0x7f0000000280), 0xc, &(0x7f0000000680)={0x0}}, 0x0) 21:46:39 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x15, r0, 0x0) 21:46:39 executing program 3: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001240)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)) 21:46:39 executing program 5: mlock(&(0x7f0000ff7000/0x2000)=nil, 0x2000) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ff7000/0x1000)=nil) 21:46:39 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020400000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:40 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8948, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:40 executing program 2: rt_sigqueueinfo(0x0, 0x6, &(0x7f00000001c0)={0x0, 0x0, 0x79f}) 21:46:40 executing program 3: socket(0xa, 0x3, 0x6) 21:46:40 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) recvmmsg(r0, &(0x7f0000003300)=[{{0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000000c0)=""/137, 0x89}], 0x1}}], 0x1, 0x0, 0x0) 21:46:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446530c20202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:40 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020500000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:40 executing program 2: add_key(&(0x7f0000000240)='asymmetric\x00', 0x0, &(0x7f00000002c0)="30cc", 0x2, 0xfffffffffffffffb) 21:46:40 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_TTY_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000a80)={&(0x7f00000009c0), 0xc, &(0x7f0000000a40)={0x0}}, 0x0) 21:46:40 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) accept$inet(r0, 0x0, 0x0) 21:46:40 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, 0x0}, 0x2042) 21:46:40 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) accept$inet(r0, 0x0, 0x0) 21:46:40 executing program 0: clock_gettime(0x0, &(0x7f0000006440)) 21:46:40 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020600000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:40 executing program 2: socket$inet(0x2, 0x0, 0x42376739) 21:46:40 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) accept$inet(r0, 0x0, 0x0) 21:46:41 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{0x0}], 0x0, 0x0) 21:46:41 executing program 2: r0 = socket(0x18, 0x0, 0x2) accept$inet(r0, 0x0, 0x0) 21:46:41 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) accept$inet(r0, 0x0, 0x0) 21:46:41 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001440), 0x0, &(0x7f0000001500)={[{@mode}, {@mode}, {@size={'size', 0x3d, [0x31, 0x0]}}]}) 21:46:41 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020700000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446531620202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000008180)={0x0, 0x3938700}) 21:46:41 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={0x0}}, 0x0) [ 708.707471] __ntfs_error: 136 callbacks suppressed [ 708.707482] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 708.742985] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 708.766331] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:46:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae90, &(0x7f0000002540)=ANY=[@ANYBLOB="0a000000000000000000000002000000060000000700000000000000000000000000004002000000070000000800000000010000000000000100008008000000ffff0000080000000300000000000000010000c00800000001"]) 21:46:41 executing program 2: prctl$PR_SET_MM_MAP(0x10, 0xe, 0xfffffffffffffffc, 0x0) 21:46:41 executing program 3: r0 = socket(0x10, 0x2, 0x0) sendmsg$xdp(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="8b", 0x1}, {&(0x7f0000000080)="8d", 0x1}], 0x2}, 0x0) [ 708.866451] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 708.875223] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 708.893161] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 21:46:41 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 21:46:41 executing program 2: mlock(&(0x7f0000ff7000/0x2000)=nil, 0x2000) syz_open_dev$vcsu(&(0x7f0000000900), 0x0, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000ff7000/0x1000)=nil) 21:46:41 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020900000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:41 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x23, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:41 executing program 3: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000980)=ANY=[@ANYBLOB='uni_xlat']) [ 709.094574] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 709.111502] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 709.125519] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:46:41 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000040)={{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x306, @local}, 0xa, {0x2, 0x0, @private}, 'batadv_slave_1\x00'}) [ 709.138624] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:46:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532120202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:41 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x38, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:41 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e24, @multicast1}, 0x10) 21:46:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x8946, &(0x7f00000002c0)={'syztnl2\x00', 0x0}) 21:46:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8921, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:41 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020a00000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:42 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x1, &(0x7f0000000040)=@raw=[@func], &(0x7f0000000100)='syzkaller\x00', 0x7, 0xfc, &(0x7f0000000140)=""/252, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:42 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000040)=@qipcrtr={0x2a, 0x3}, 0x80, 0x0, 0x0, &(0x7f0000000300)=[@timestamping={{0x14}}], 0x18}, 0x0) 21:46:42 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x10, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:42 executing program 2: bpf$BPF_PROG_QUERY(0x16, &(0x7f0000000180)={0xffffffffffffffff, 0xd, 0x0, 0x0, 0x0}, 0x20) 21:46:42 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020b00000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653200b202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:42 executing program 2: r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x2, 0x0) read$usbfs(r0, 0x0, 0x0) 21:46:42 executing program 0: ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000040)=@buf) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000580)) 21:46:42 executing program 3: statx(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x96a0a0, &(0x7f00000007c0)) 21:46:42 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x1b, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:42 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:42 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x2, &(0x7f0000000040)=@raw=[@func, @call], &(0x7f0000000100)='syzkaller\x00', 0x7, 0xfc, &(0x7f0000000140)=""/252, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:42 executing program 3: r0 = socket(0x18, 0x0, 0x2) sendmsg$nl_route(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 21:46:42 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020c00000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:42 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000a00)={'wpan4\x00'}) syz_genetlink_get_family_id$nbd(&(0x7f0000000b80), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 21:46:42 executing program 0: add_key(&(0x7f0000000280)='encrypted\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000001300), &(0x7f0000001380)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, r0, r1) 21:46:42 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000001100)={0x0, 0x0, 0x0}, 0x0) 21:46:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653200c202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:42 executing program 2: select(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000180)={0x2}, &(0x7f0000000200)={0x77359400}) 21:46:42 executing program 3: socket(0x1e, 0x0, 0x2) 21:46:42 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8946, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback}}) 21:46:42 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020d00000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:42 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000040)={@remote, @dev}, 0x8) 21:46:43 executing program 3: r0 = socket(0x18, 0x0, 0x2) ioctl$sock_SIOCDELRT(r0, 0x8907, 0x0) 21:46:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000040)={@remote, @dev}, 0x8) 21:46:43 executing program 5: socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8947, &(0x7f0000001480)={'erspan0\x00', 0x0}) 21:46:43 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020e00000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:43 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8911, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000040)={@remote, @dev}, 0x8) 21:46:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532016202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:43 executing program 2: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000b00), 0x0, 0x0) 21:46:43 executing program 5: socketpair(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/31, 0x1f}], 0x1}, 0x0) 21:46:43 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000040)={@remote, @dev}, 0x8) 21:46:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae90, &(0x7f0000002540)=ANY=[@ANYBLOB="0a000000000000000100000002000000060000000700000000000000000000000000004002000000070000000800000000010000000000000100008008000000ffff0000080000000300000000000000010000c00800000001"]) 21:46:43 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000021000000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532021202000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:43 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r0, &(0x7f0000000fc0)={0x0, 0x0, &(0x7f0000000f80)={0x0}}, 0x20000041) 21:46:43 executing program 3: io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r0, 0x1, &(0x7f00000004c0)=[0x0]) 21:46:43 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) add_key(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="e4", 0x1, r1) 21:46:44 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xc, &(0x7f0000000000)=@framed={{}, [@func, @call, @alu, @exit, @func, @alu, @exit, @map_val]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:44 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='mode']) 21:46:44 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0x24, 0x0, 0x0) 21:46:44 executing program 2: add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x4, 0x0, 0x0) [ 711.808991] tmpfs: No value for mount option 'mode' [ 711.827229] tmpfs: No value for mount option 'mode' 21:46:44 executing program 5: r0 = socket(0x18, 0x0, 0x2) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 21:46:44 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0xb, 0x0, 0x0) 21:46:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000021100000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:44 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/mnt\x00') 21:46:44 executing program 3: socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001480)={'ip_vti0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="69705f7674693000000000000000000004f13c9c7fed3c"]}) 21:46:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320200b2000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:44 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:46:44 executing program 5: prctl$PR_SET_MM_MAP(0x23, 0xd, 0xfffffffffffffffc, 0x0) 21:46:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000021200000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:44 executing program 3: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={0xffffffffffffffff, 0xb, 0x0, 0x0, 0x0}, 0x20) 21:46:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback}}) 21:46:44 executing program 5: syz_open_dev$vcsu(&(0x7f0000000000), 0x6, 0x40) 21:46:45 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001440), 0x0, &(0x7f0000001500)={[{@mode}, {@mpol={'mpol', 0x3d, {'bind', '=static'}}}, {@size={'size', 0x3d, [0x31, 0x31, 0x70]}}], [{@seclabel}, {@obj_user}]}) 21:46:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) bind$xdp(r2, 0x0, 0x0) 21:46:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback}}) 21:46:45 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000440)={0x0, 0x4000}}, 0x0) 21:46:45 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0xf, r0, 0x0) 21:46:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320200c2000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:45 executing program 3: socketpair(0x2c, 0x0, 0x0, &(0x7f0000006240)) 21:46:45 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000021400000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:45 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f00000008c0), 0x2, 0x0) 21:46:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback}}) 21:46:45 executing program 5: r0 = socket(0xa, 0x2, 0x0) bind$xdp(r0, &(0x7f0000002a00)={0x2, 0x4}, 0x10) 21:46:45 executing program 2: socket$inet(0x2, 0xa, 0xfff) 21:46:45 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x3, r0, 0x0) 21:46:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @loopback}}) 21:46:45 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendmsg$xdp(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="8b", 0x1}, {&(0x7f0000000080)="8d", 0x1}, {&(0x7f0000000140)="8f", 0x1}], 0x3}, 0x0) 21:46:45 executing program 5: socket$bt_rfcomm(0x2c, 0x0, 0x3) 21:46:45 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x2, r0, 0x0) 21:46:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020162000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:45 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020007000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:45 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x0) 21:46:45 executing program 0: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)) 21:46:45 executing program 2: getresuid(&(0x7f0000000a00), &(0x7f0000000a40), 0x0) 21:46:45 executing program 3: r0 = socket(0xa, 0x2, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 21:46:45 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) getpeername$tipc(r0, 0x0, 0x0) 21:46:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000005380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40002062, 0x0) 21:46:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r0, &(0x7f0000000640)={&(0x7f0000000540), 0xc, &(0x7f0000000600)={0x0}}, 0x0) 21:46:45 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8916, 0x0) 21:46:45 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000d80), 0x0, 0x0) statx(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 21:46:45 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x88, 0x2a, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) [ 713.728509] __ntfs_error: 101 callbacks suppressed [ 713.728527] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 713.743597] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 713.758149] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 713.817701] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 713.833232] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 713.848668] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 21:46:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020212000020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:46 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000029f07000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:46 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x140, 0x0) 21:46:46 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) recvmmsg(r0, &(0x7f0000005280)=[{{0x0, 0x0, &(0x7f00000011c0)=[{&(0x7f0000000080)=""/11, 0xb}], 0x1}}], 0x1, 0x2062, 0x0) 21:46:46 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=ANY=[], 0x4c}}, 0x0) [ 713.999622] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 714.048083] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 714.070244] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 714.137974] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:46:46 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) recvmmsg(r0, &(0x7f0000003180)=[{{0x0, 0x0, 0x0}}], 0x1, 0x122, &(0x7f0000003240)={0x77359400}) 21:46:46 executing program 2: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003680)={0x0, 0x989680}) 21:46:46 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x140, 0x0) 21:46:46 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x33, 0x0, 0x0) 21:46:46 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002ad07000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:46 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x140, 0x0) 21:46:46 executing program 2: r0 = socket(0xa, 0x2, 0x0) bind$xdp(r0, 0x0, 0x0) 21:46:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020200b00020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:46 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) recvmmsg(r0, &(0x7f0000000380)=[{{&(0x7f0000000000)=@pppol2tpv3, 0x80, &(0x7f0000000240)=[{&(0x7f0000000080)=""/29, 0x1d}, {&(0x7f00000000c0)=""/85, 0x55}, {&(0x7f0000000140)=""/242, 0xfffffffffffffdd6}], 0x3, &(0x7f0000000280)=""/11, 0xb}}], 0x1, 0x0, &(0x7f0000000340)) 21:46:46 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002f207000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:46 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x140, 0x0) 21:46:46 executing program 2: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000140)={0x0, {{0x2, 0x0, @loopback}}, 0x0, 0x3, [{{0x2, 0x0, @remote}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {{0x2, 0x0, @remote}}]}, 0x210) 21:46:47 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, r0, r0) 21:46:47 executing program 5: socket(0x10, 0x0, 0x15) 21:46:47 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500), 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, 0x0, 0x0) 21:46:47 executing program 2: socket(0x28, 0x0, 0x6) 21:46:47 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002000d000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020200c00020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:47 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$xdp(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0) 21:46:47 executing program 0: syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x3) 21:46:47 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020040000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:47 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000d40)={0x0, 0x0, &(0x7f0000000d00)={0x0}}, 0x4000801) 21:46:47 executing program 3: bpf$BPF_PROG_QUERY(0xd, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) 21:46:47 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x453, 0x4, 0x0, 0x0, 'U', [""]}, 0x14}}, 0x0) 21:46:47 executing program 0: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) fork() mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xc) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) 21:46:47 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={0x0}}, 0x40) 21:46:47 executing program 2: sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) mlock(&(0x7f0000ff7000/0x2000)=nil, 0x2000) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000, 0x0, &(0x7f0000ff3000/0x2000)=nil) 21:46:47 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020fff000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:47 executing program 5: syslog(0x3, &(0x7f00000001c0)=""/164, 0xa4) 21:46:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020201600020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:48 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x18}, 0x40) 21:46:48 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x23, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:48 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x5, 0x0, 0x0) 21:46:48 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020000090000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:48 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x11, r0, 0x0) 21:46:48 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000011c0), 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000080)) 21:46:48 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020000100000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:48 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xe, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:48 executing program 3: socketpair(0x2, 0x3, 0x2, &(0x7f0000000400)) 21:46:48 executing program 5: mlock(&(0x7f0000ff1000/0xf000)=nil, 0xf000) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 21:46:48 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89b0, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:48 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200), 0x40, 0x0) 21:46:48 executing program 0: socketpair(0x10, 0x2, 0x4, &(0x7f0000003800)) 21:46:48 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000280ffffff00000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:48 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000340)='./file0\x00', 0x605, 0x3, &(0x7f00000001c0)=[{&(0x7f0000000080), 0x0, 0x8}, {&(0x7f0000000440)="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", 0x7ff, 0x7fffffff}, {&(0x7f0000000100)="9a3ec050e6efc7c2dc103eb4597f4d28d51fed96c41531c4fa681629f602eaebae1591d21026a37ca17c739235762a71501340d680821e4452ca15dc9a9245089fa088002e33e2e69a92cd2653d1393aa2749143821ed6d9998119dc68c04a32254e64bf6abfe816407c7950ef094b1dc03501ee57b1dd75120421c8a39e67c6e08138bf51e8a028a8ba6258866dad5ca38ce855a47ec8ddc301cbb72e9fbbe11e13e709edaf541bc95c100adfc947e618ed08cb408a42a9919c9ec8672e", 0xbe}], 0x10, &(0x7f0000000240)={[{@nonumtail}, {@shortname_lower}, {@shortname_winnt}], [{@euid_lt={'euid<', 0xee01}}, {@fowner_gt}, {@obj_user}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@fowner_lt={'fowner<', 0xee01}}]}) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0xc0000) socket$nl_generic(0x10, 0x3, 0x10) 21:46:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202100020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:48 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000d80), 0x0, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 21:46:48 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@remote, @empty}, 0x8) 21:46:48 executing program 5: syz_mount_image$f2fs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x1, &(0x7f00000026c0)=[{&(0x7f00000001c0)="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", 0x1ff, 0x1}], 0x0, &(0x7f0000002880)={[{@user_xattr}]}) 21:46:48 executing program 0: mlock(&(0x7f0000ff7000/0x2000)=nil, 0x2000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000ff9000/0x4000)=nil) 21:46:48 executing program 2: socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x5}}, 0x0) 21:46:48 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020802000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:48 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@remote, @empty}, 0x8) 21:46:49 executing program 0: socket$inet(0x2, 0xa, 0x0) select(0x40, &(0x7f0000000100)={0x8}, 0x0, 0x0, &(0x7f0000000200)) [ 716.595166] F2FS-fs (loop5): Unable to read 1th superblock [ 716.615090] F2FS-fs (loop5): Unable to read 2th superblock [ 716.631017] F2FS-fs (loop5): Unable to read 1th superblock 21:46:49 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendmsg$xdp(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="8b", 0x1}, {0x0}, {&(0x7f0000000140)="8f", 0x1}], 0x3}, 0x0) 21:46:49 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@remote, @empty}, 0x8) [ 716.661168] F2FS-fs (loop5): Unable to read 2th superblock 21:46:49 executing program 0: prctl$PR_SET_MM_MAP(0xe, 0xe, 0xfffffffffffffffc, 0x0) [ 716.820527] F2FS-fs (loop5): Unable to read 1th superblock [ 716.826302] F2FS-fs (loop5): Unable to read 2th superblock [ 716.840247] F2FS-fs (loop5): Unable to read 1th superblock [ 716.853232] F2FS-fs (loop5): Unable to read 2th superblock 21:46:49 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000000)={@remote, @empty}, 0x8) 21:46:49 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x32842, 0x0) 21:46:49 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020803000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:49 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x4d, 0x0, 0x0) 21:46:49 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202004000800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:49 executing program 5: syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000880), 0xffffffffffffffff) 21:46:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x9, 0x9, 0x0, 0x4, 0x40}, 0x40) 21:46:49 executing program 0: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ff3000/0x2000)=nil) 21:46:49 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x890b, 0x0) 21:46:49 executing program 3: r0 = socket(0x10, 0x2, 0x0) mmap$xdp(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) 21:46:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000340)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000240)={[{@shortname_winnt}], [{@euid_lt={'euid<', 0xee01}}]}) 21:46:49 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020804000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000002540)=ANY=[@ANYBLOB="0a000000000000000000000002000000060000000700000000000000000000000700000002000000070000000800000000010000000000000100008008000000ffff0000080000000300000000000000010000c008000000010000000800000001800000000000000800008003000000ffff0000ff0000000100000000000000010000000400000007000000b2"]) 21:46:49 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000bc0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000b80)={&(0x7f00000008c0)={0x14}, 0x14}}, 0x0) 21:46:49 executing program 2: socket$bt_rfcomm(0xf, 0x0, 0x3) 21:46:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x9, 0x1ff, 0x5, 0x27c6, 0x14}, 0x40) [ 717.296114] FAT-fs (loop5): Unrecognized mount option "euid<00000000000000060929" or missing value [ 717.423946] FAT-fs (loop5): Unrecognized mount option "euid<00000000000000060929" or missing value 21:46:50 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202002020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:50 executing program 3: prctl$PR_SET_MM_MAP(0x53564d41, 0xe, 0xfffffffffffffffc, 0x0) 21:46:50 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020805000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x9, 0x1ff, 0x5, 0x27c6, 0x14}, 0x40) 21:46:50 executing program 5: timer_create(0x0, 0x0, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x77359400}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 21:46:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x4, &(0x7f0000000040)=@framed={{}, [@jmp]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:50 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}, 0x1, 0x0, 0x4000}, 0x0) 21:46:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020806000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:50 executing program 3: syz_mount_image$fuse(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)) 21:46:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 21:46:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x9, 0x1ff, 0x5, 0x27c6, 0x14}, 0x40) 21:46:50 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202003020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:50 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:50 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8949, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:50 executing program 3: pkey_mprotect(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0, 0xffffffffffffffff) 21:46:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x9, 0x1ff, 0x5, 0x27c6, 0x14}, 0x40) 21:46:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020807000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:50 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[{@size={'size', 0x3d, [0x70]}}], [{@obj_user}]}) 21:46:50 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8927, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:46:50 executing program 2: prctl$PR_SET_MM_MAP(0x38, 0xe, 0xfffffffffffffffc, 0x0) 21:46:50 executing program 5: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x22, 0x0, 0x0) [ 718.386143] tmpfs: Bad mount option obj_user 21:46:50 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) accept4(r0, 0x0, 0x0, 0x0) [ 718.407028] tmpfs: Bad mount option obj_user 21:46:50 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$sock(r0, &(0x7f0000001780)={&(0x7f0000000040)=@qipcrtr={0x2a, 0x2}, 0x80, 0x0, 0x0, &(0x7f0000001740)=[@txtime={{0x18}}], 0x18}, 0x0) 21:46:51 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202004020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020808000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:51 executing program 0: syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x404040) 21:46:51 executing program 2: mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x200a, 0xc) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 21:46:51 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_SET_FEATURE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x20}, 0x20}, 0x300}, 0x0) 21:46:51 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000100)='keyring\x00', 0x0, &(0x7f0000000180)="16", 0x1, r0) 21:46:51 executing program 0: request_key(&(0x7f0000000000)='cifs.idmap\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0xfffffffffffffff9) 21:46:51 executing program 5: prctl$PR_SET_MM_MAP(0x36, 0xe, 0xfffffffffffffffc, 0x0) 21:46:51 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x15, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) [ 718.844354] __ntfs_error: 117 callbacks suppressed [ 718.844366] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 718.869497] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:46:51 executing program 0: prctl$PR_SET_MM_MAP(0x37, 0xe, 0xfffffffffffffffc, 0x0) 21:46:51 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x11, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) [ 718.956037] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:46:51 executing program 3: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={0xffffffffffffffff, 0xa, 0x0, 0x0, 0x0}, 0x20) [ 719.145868] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 719.161867] ntfs: (device loop1): ntfs_fill_super(): Unable to set device block size to sector size (516). 21:46:51 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202005020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020809000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:51 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x85, &(0x7f0000000000), 0x4) 21:46:51 executing program 0: r0 = socket(0x18, 0x0, 0x2) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 21:46:51 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_KEY(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000001040)={0x14}, 0x14}}, 0x0) 21:46:51 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001500)={[], [{@obj_user}]}) [ 719.215261] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 719.230627] ntfs: (device loop1): ntfs_fill_super(): Unable to set device block size to sector size (516). [ 719.318019] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 719.340160] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 719.355389] tmpfs: Bad mount option obj_user 21:46:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000b00), 0x0, &(0x7f0000000c40)={[{@shortname_mixed}, {@numtail}, {@iocharset={'iocharset', 0x3d, 'cp437'}}, {@shortname_winnt}, {@fat=@errors_remount}], [{@euid_gt}, {@context={'context', 0x3d, 'sysadm_u'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) 21:46:51 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x13, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) [ 719.372818] tmpfs: Bad mount option obj_user [ 719.392482] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:46:51 executing program 5: bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0xfffffffe}, 0x8) 21:46:51 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) 21:46:51 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000340)='./file0\x00', 0x605, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000440)}, {&(0x7f0000000100)}], 0x0, &(0x7f0000000240)={[{@nonumtail}, {@shortname_winnt}], [{@obj_user}, {@euid_eq={'euid', 0x3d, 0xee00}}]}) r1 = accept(0xffffffffffffffff, &(0x7f0000005040)=@tipc=@name, &(0x7f00000050c0)=0x80) accept4$unix(r1, 0x0, &(0x7f0000005100), 0xc0000) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) 21:46:51 executing program 2: syz_open_dev$vcsu(&(0x7f0000001200), 0x0, 0x200000) 21:46:52 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202006020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002080e000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:52 executing program 5: mlock(&(0x7f0000ff7000/0x2000)=nil, 0x2000) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000ff7000/0x2000)=nil}) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ff3000/0x2000)=nil) 21:46:52 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x18, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:52 executing program 2: socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x8947, &(0x7f0000001480)={'ip_vti0\x00', &(0x7f0000001400)={'ip_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1}}}}) 21:46:52 executing program 3: socketpair(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000200)={&(0x7f0000000000)=@rc={0x1f, @none}, 0x80, 0x0}, 0x0) 21:46:52 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000040)='user\x00', &(0x7f0000000080)='keyring\x00') 21:46:52 executing program 0: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x4e, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 21:46:52 executing program 2: mremap(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x3000, 0x7, &(0x7f0000ffd000/0x3000)=nil) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000fee000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000fef000/0x1000)=nil, &(0x7f0000ff0000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff0000/0x1000)=nil, &(0x7f0000fef000/0x1000)=nil, &(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ff1000/0x2000)=nil, 0x0}, 0x68) 21:46:52 executing program 3: socketpair(0x1e, 0x805, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) 21:46:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020813000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:52 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000003500)) getresgid(&(0x7f0000003600), &(0x7f0000003640), &(0x7f0000003680)) 21:46:52 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202007020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:52 executing program 3: syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x402000) 21:46:52 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f00000000c0)={'syztnl2\x00', 0x0}) 21:46:52 executing program 2: io_cancel(0x0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 21:46:52 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 21:46:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020821000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:52 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0x2380, 0x0) 21:46:52 executing program 5: r0 = socket(0xa, 0x2, 0x0) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000300)={&(0x7f0000000180), 0xc, &(0x7f00000002c0)={0x0}}, 0x0) 21:46:52 executing program 2: socketpair(0x2, 0x2, 0x0, &(0x7f0000003800)) 21:46:52 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@buf) 21:46:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020823000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:52 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)) 21:46:53 executing program 5: bpf$BPF_PROG_QUERY(0x2, 0x0, 0x0) 21:46:53 executing program 2: socket$inet(0x2, 0x2, 0x4) 21:46:53 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, 0x0, 0x0) 21:46:53 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001240)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) bind$unix(r0, 0x0, 0x0) 21:46:53 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202008020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020848000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:53 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000200), 0x0, 0x0) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) 21:46:53 executing program 3: mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x0, &(0x7f0000ff7000/0x1000)=nil) remap_file_pages(&(0x7f0000ff7000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) 21:46:53 executing program 0: r0 = socket(0xa, 0x2, 0x0) bind$xdp(r0, &(0x7f0000002a00)={0x2}, 0x18) 21:46:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002084c000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:53 executing program 2: r0 = socket(0xa, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x29, 0x1a, 0x0, 0x0) 21:46:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xd8, &(0x7f0000000100)=""/216, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:53 executing program 3: r0 = socket(0x10, 0x2, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x3, 0x0, 0x0) 21:46:53 executing program 0: delete_module(&(0x7f0000000100)='/sys/kernel/debug/binder/transaction_log\x00', 0x0) 21:46:53 executing program 2: r0 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000000)=0xffffffff, 0x4) 21:46:53 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x20, 0x3, &(0x7f00000007c0)=[{0x0, 0x0, 0x2}, {0x0}, {0x0}], 0x0, 0x0) [ 721.197457] Trying to set illegal importance in message 21:46:53 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202009020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:53 executing program 3: epoll_create(0x9) 21:46:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020868000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:53 executing program 0: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0}, 0x20) 21:46:53 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x1, &(0x7f0000000040)=@raw=[@generic], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:53 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0x5, &(0x7f0000000000)=@framed={{}, [@map_val]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:46:53 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, 0x0) 21:46:54 executing program 0: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xc) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 21:46:54 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100), 0x10) getsockname(r0, 0x0, &(0x7f0000000240)) 21:46:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x50, 0x50, 0x5, [@restrict, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x6d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:46:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x4, [@restrict, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0x80}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:46:54 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x0, 0xffffffff}]}) timer_create(0x0, 0x0, &(0x7f0000000200)) timer_delete(0x0) 21:46:54 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202013020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002086c000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:54 executing program 0: io_cancel(0x0, &(0x7f0000002280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 21:46:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020874000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:54 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000027c0), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 21:46:54 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 21:46:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002087a000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:54 executing program 0: socketpair(0xa, 0x0, 0xc00, 0x0) 21:46:55 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000140)={'tunl0\x00', 0x0}) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000033c0)) 21:46:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x50, 0x50, 0x5, [@restrict, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x6d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:46:57 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x80, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f0000000240)={0x0, 'lo\x00'}) 21:46:57 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffc}]}) r0 = socket$nl_audit(0x10, 0x3, 0x9) syncfs(r0) 21:46:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:46:57 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202023020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:46:57 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2) write$evdev(r0, &(0x7f000004d000)=[{}], 0xfffffe82) write$evdev(r0, &(0x7f00000000c0)=[{}], 0x18) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) [ 724.807223] 8021q: VLANs not supported on lo [ 724.818232] __ntfs_error: 77 callbacks suppressed [ 724.818244] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 724.836070] 8021q: VLANs not supported on lo 21:46:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}}, 0x0) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 21:46:57 executing program 0: prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000033c0)) [ 724.867212] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 724.903619] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:46:57 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002600)='./cgroup.net/syz1\x00', 0x200002, 0x0) [ 724.974685] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 724.998365] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:46:57 executing program 2: syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) [ 725.041951] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:46:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x4, [@restrict, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0]}}, 0x0, 0xac}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:46:57 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66f126b0d81a193f030800000000fe7c6055e1069f09c691b8f953d430e26b4b6d07d4a92dd90d8e0a8c8cb22f27aa1c8bd340f45c6237e8d0cd8ba443a08ae3d144e616ea56aeb71703bad785fc4cc66176f07f795695c4643ee70ef9820930155c17dd7fd59a7e15fb3449469e7f335ab1c501d99c4dcb6f9c4ca80fbfaa6e36375f5f37987b0edf4390066f32091c60dcdc8c4bc092e5e010b6ddab91ba", 0x9f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000440)=[{{&(0x7f0000000140)=@xdp, 0x80, 0x0}}], 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 725.229751] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 725.238291] ntfs: (device loop1): ntfs_fill_super(): Unable to set device block size to sector size (547). 21:47:00 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20044011, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) sendto$inet(r0, &(0x7f00000003c0)="e8fd8f6cd5f646ca6c49b24e37da96bbce6a454ed70388", 0xfffffffffffffeb7, 0x44048, &(0x7f00000000c0)={0x2, 0x0, @private}, 0x10) 21:47:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x50, 0x50, 0x5, [@restrict, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x6d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:47:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66f126b0d81a193f030800000000fe7c6055e1069f09c691b8f953d430e26b4b6d07d4a92dd90d8e0a8c8cb22f27aa1c8bd340f45c6237e8d0cd8ba443a08ae3d144e616ea56aeb71703bad785fc4cc66176f07f795695c4643ee70ef9820930155c17dd7fd59a7e15fb3449469e7f335ab1c501d99c4dcb6f9c4ca80fbfaa6e36375f5f37987b0edf4390066f32091c60dcdc8c4bc092e5e010b6ddab91ba", 0x9f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000440)=[{{&(0x7f0000000140)=@xdp, 0x80, 0x0}}], 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:47:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202048020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020885030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66f126b0d81a193f030800000000fe7c6055e1069f09c691b8f953d430e26b4b6d07d4a92dd90d8e0a8c8cb22f27aa1c8bd340f45c6237e8d0cd8ba443a08ae3d144e616ea56aeb71703bad785fc4cc66176f07f795695c4643ee70ef9820930155c17dd7fd59a7e15fb3449469e7f335ab1c501d99c4dcb6f9c4ca80fbfaa6e36375f5f37987b0edf4390066f32091c60dcdc8c4bc092e5e010b6ddab91ba", 0x9f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000440)=[{{&(0x7f0000000140)=@xdp, 0x80, 0x0}}], 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 727.776484] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 727.788079] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:47:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66f126b0d81a193f030800000000fe7c6055e1069f09c691b8f953d430e26b4b6d07d4a92dd90d8e0a8c8cb22f27aa1c8bd340f45c6237e8d0cd8ba443a08ae3d144e616ea56aeb71703bad785fc4cc66176f07f795695c4643ee70ef9820930155c17dd7fd59a7e15fb3449469e7f335ab1c501d99c4dcb6f9c4ca80fbfaa6e36375f5f37987b0edf4390066f32091c60dcdc8c4bc092e5e010b6ddab91ba", 0x9f}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000000440)=[{{&(0x7f0000000140)=@xdp, 0x80, 0x0}}], 0x1, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:47:00 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x5, [@restrict, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xad}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:47:00 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x5, [@restrict, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xad}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:47:00 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffc}]}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) lseek(r0, 0x0, 0x0) 21:47:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020887030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, 0x0, 0x0) 21:47:00 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000002c0)=0x3, 0x4) rt_tgsigqueueinfo(0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) r3 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(r3, &(0x7f0000000540), 0x0, 0x81805, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f00000000c0)={0x0, {}, 0x0, {}, 0x5, 0x0, 0x3, 0x0, "5b6e292720ad1c122716751da9bf189513d61d4796c07a6a60c48e0a829f91b97739809d64e869ae16798a44aad614fac6a21d3dcf2b3e871587f53cd809f98e", "f8b699c929b92ee722240b5b4c44a41eb88c87cff1866be0bec480ebc5c2189e"}) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x1d, 0x9, "2bbb19e5631df896ba98674d0b4703551f0d03e2ed186049da15bffbdd1a3e02c2dda1e04e6fcd5ce9801d897649292487be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49"}) 21:47:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x50, 0x50, 0x5, [@restrict, @enum={0x0, 0x5, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}]}, @int]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x6d}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:47:03 executing program 0: openat$null(0xffffffffffffff9c, 0x0, 0x420900, 0x0) 21:47:03 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020204c020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:03 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020888030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="080181803e010000c10100000500000009010000ff7f00000000000000000000c2618a8661aa09"], 0x92c) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 21:47:03 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dcc2025aa18c9228103b66e1d49d31d322dbecfa63da445b8bef5bd9125939f50bd2d4ed96a074eb04a348a666bf58b23ac4ed", 0x9f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 21:47:03 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) [ 730.863749] __ntfs_error: 11 callbacks suppressed [ 730.863761] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 730.910826] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 730.947652] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:47:03 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x5, [@restrict, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xad}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:47:03 executing program 0: io_cancel(0x0, &(0x7f0000006280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) pipe(&(0x7f00000063c0)) 21:47:03 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="080181803e010000c10100000500000009010000ff7f00000000000000000000c2618a8661aa09"], 0x92c) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) [ 731.036514] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 731.045005] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 731.045019] ntfs: (device loop1): ntfs_fill_super(): Unable to set device block size to sector size (588). 21:47:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, 0x0) 21:47:03 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020889030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 731.074842] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 731.097521] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 731.236650] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 731.253867] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:47:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002088a030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="080181803e010000c10100000500000009010000ff7f00000000000000000000c2618a8661aa09"], 0x92c) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 21:47:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, 0x0) 21:47:06 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202068020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:06 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0}}, 0x0) 21:47:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, 0x0) 21:47:06 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/unix\x00') read$FUSE(r0, &(0x7f00000010c0)={0x2020}, 0x2020) 21:47:06 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x5, [@restrict, @enum={0x0, 0x6, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}]}, @int, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xad}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r1, 0x40) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:47:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, 0x0) 21:47:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002088b030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="080181803e010000c10100000500000009010000ff7f00000000000000000000c2618a8661aa09"], 0x92c) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000000)={0x15, 0x0, 0x0, 0x0, 0x0, "00000007000000000000000900000000001000"}) 21:47:06 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0xfffffea7) 21:47:06 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020206c020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:06 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r0, &(0x7f0000000780)={&(0x7f0000000640), 0xffffffffffffff09, 0x0}, 0x0) 21:47:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002088c030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:06 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b04, &(0x7f0000000180)={'wlan0\x00'}) 21:47:06 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x48, &(0x7f0000000440)={@multicast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "a0f009", 0x12, 0x3a, 0x0, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, [{}]}}}}}}, 0x0) 21:47:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002088d030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:06 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b04, &(0x7f0000000180)={'wlan0\x00'}) 21:47:09 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000200)='cpuset.mem_exclusive\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0xfffffffffffffffc, 0x12) write$cgroup_int(r1, &(0x7f0000000140), 0x12) 21:47:09 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000040)={0x8}) 21:47:09 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b04, &(0x7f0000000180)={'wlan0\x00'}) 21:47:09 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208a8030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:09 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202074020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') lseek(r0, 0x10000000000001, 0x0) 21:47:09 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000005340)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000005400)) [ 737.243172] new mount options do not match the existing superblock, will be ignored [ 737.257013] __ntfs_error: 35 callbacks suppressed [ 737.257025] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:47:09 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8b04, &(0x7f0000000180)={'wlan0\x00'}) 21:47:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') lseek(r0, 0x10000000000001, 0x0) [ 737.310708] new mount options do not match the existing superblock, will be ignored [ 737.346038] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:47:09 executing program 5: socket(0x34, 0x0, 0x0) 21:47:09 executing program 3: add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) [ 737.397920] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:47:09 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/zoneinfo\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002100)={0x2020}, 0x2020) 21:47:09 executing program 5: epoll_create(0x6) 21:47:09 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp\x00') lseek(r0, 0xff, 0x0) [ 737.491158] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 737.517640] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:47:09 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') lseek(r0, 0x10000000000001, 0x0) [ 737.596251] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:47:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800050000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 737.750837] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 737.777908] ntfs: (device loop1): ntfs_fill_super(): Unable to set device block size to sector size (628). [ 737.797676] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 737.807265] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:47:10 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000c00)={&(0x7f0000000bc0)={0x1c, 0xc, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 21:47:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000080)=""/4096) 21:47:10 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x34, 0x3, 0x8, 0x3, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_L3PROTO={0x6}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @tcp}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}}, 0x0) 21:47:10 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') lseek(r0, 0x10000000000001, 0x0) 21:47:10 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020207a020800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800060000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:10 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, 0x0, 0x0) 21:47:10 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x8942, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) 21:47:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800070000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:10 executing program 2: set_mempolicy(0x2, &(0x7f0000000000)=0xfe, 0x8) 21:47:10 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmstat\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 21:47:10 executing program 2: r0 = epoll_create1(0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="2f6429e32e15756c6c623000"], &(0x7f0000000380)='./file1\x00', &(0x7f00000003c0)='bpf\x00', 0x0, &(0x7f0000000400)='\x19%\x00') r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x1, 0x200) socket$nl_audit(0x10, 0x3, 0x9) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002a00), 0x361100, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r2, 0x89f5, 0x0) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f00000010c0)={0x8, 0x3, 0x6, 0x5}) ioctl$BTRFS_IOC_ADD_DEV(r0, 0x5000940a, &(0x7f0000000040)={{r1}, "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001040), 0x48000, 0x0) 21:47:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800090000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:10 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x3, 0x6, 0x301, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 21:47:10 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) 21:47:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev_mcast\x00') lseek(r0, 0x400000007bff, 0x0) 21:47:10 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000030800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:10 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$key(r0, &(0x7f00000001c0)={0x600000000000000, 0x0, &(0x7f0000000080)={&(0x7f0000000500)={0x2, 0x3, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_lifetime={0x4, 0x4}, @sadb_lifetime={0x4, 0x3, 0xfffffffd}]}, 0x90}}, 0x0) 21:47:10 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000005c0)=@nat={'nat\x00', 0x1b, 0x5, 0x508, 0x320, 0x118, 0xffffffff, 0x0, 0x320, 0x438, 0x438, 0xffffffff, 0x438, 0x438, 0x5, 0x0, {[{{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@hl={{0x28}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv6=@mcast2, @ipv4=@local, @port, @icmp_id}}}, {{@ipv6={@loopback, @mcast1, [], [], 'lo\x00', 'ip6tnl0\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@inet=@set1={{0x28}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@private, @ipv4=@broadcast, @gre_key, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@private2, @ipv6=@dev, @gre_key}}}, {{@ipv6={@private2, @private1, [], [], 'veth1_to_hsr\x00', 'bridge_slave_0\x00'}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@icmp6={{0x28}, {0x0, "a3b1"}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv6=@mcast1, @ipv6=@private2, @gre_key, @gre_key}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x568) 21:47:10 executing program 2: rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000080)) 21:47:10 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000040c0)='net/softnet_stat\x00') read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 21:47:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208000e0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 738.563899] x_tables: duplicate underflow at hook 1 21:47:11 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000280)=@req3={0x7, 0x9}, 0x1c) 21:47:11 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00') read$FUSE(r0, 0x0, 0x0) 21:47:11 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800130000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:11 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) exit(0x0) dup3(r1, r0, 0x0) read$FUSE(r0, 0x0, 0x0) 21:47:11 executing program 2: ioprio_set$pid(0x0, 0xffffffffffffffff, 0x2004) 21:47:11 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000007600), 0x20000, 0x0) 21:47:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000070800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:11 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380), 0x0, 0x20841) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x0, 0x0, 0xe, 0x0, "5cc39abf3e70f3e2918e3f1ba6126a30e1fe1a28819106bdcd0dcd7106fa6bae82dc349c7be3217706bae9d72e79913408dafded13a60ade7e4ac2e8bf7ad595", "15b45b3ff95a34e523d08917aeab43fcdbb55a4b67ae1df13efce426a51453a6"}) 21:47:11 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) 21:47:11 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_matches\x00') read$FUSE(r0, 0x0, 0x0) 21:47:11 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208001f0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:11 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=@ipv6_newaddrlabel={0x64, 0x48, 0x1, 0x0, 0x0, {}, [@IFAL_ADDRESS={0x1, 0x1, @private1}, @IFAL_LABEL={0x8}, @IFAL_LABEL={0x8}, @IFAL_LABEL={0x8}, @IFAL_LABEL={0x8}, @IFAL_ADDRESS={0x14, 0x1, @remote}]}, 0x64}}, 0x0) 21:47:11 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_matches\x00') read$FUSE(r0, 0x0, 0x0) 21:47:11 executing program 5: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/stat\x00', 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x40000212) 21:47:11 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800200000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 739.095856] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. 21:47:12 executing program 0: r0 = add_key$keyring(&(0x7f0000001140), &(0x7f0000001180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$unlink(0x9, r1, r0) 21:47:12 executing program 3: bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0xfffffffffffffcf4) 21:47:12 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_matches\x00') read$FUSE(r0, 0x0, 0x0) 21:47:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000180)=0x7, 0x4) 21:47:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800210000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000f0800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:12 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_tables_matches\x00') read$FUSE(r0, 0x0, 0x0) 21:47:12 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000001600)='attr/fscreate\x00') 21:47:12 executing program 5: recvfrom$unix(0xffffffffffffffff, 0xfffffffffffffffc, 0xfffffffffffffed3, 0x0, 0x0, 0x0) 21:47:12 executing program 0: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_current(r0, &(0x7f0000000040)=@profile={'permprofile ', '\x00'}, 0xd) 21:47:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020860220000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:12 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000000100)) 21:47:12 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, 0x0) 21:47:12 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/bus/input/devices\x00', 0x0, 0x0) 21:47:12 executing program 3: openat$urandom(0xffffffffffffff9c, 0x0, 0x61c600, 0x0) 21:47:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev\x00') read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 21:47:12 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp\x00') read$FUSE(r0, &(0x7f0000004300)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 21:47:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000140800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:12 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='numa_maps\x00') ioctl$int_out(r0, 0x5460, &(0x7f0000000280)) 21:47:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000040)=0xfffffffc, 0x4) 21:47:12 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/net\x00') 21:47:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x6, 0x301}, 0x14}}, 0x0) 21:47:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800230000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:12 executing program 3: mq_open(&(0x7f0000000000)='$*:!\xe2', 0x40, 0x0, 0x0) 21:47:12 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000cc0)={0x0, 0x0, &(0x7f0000000c80)={&(0x7f0000000000)=@ipv4_newrule={0x1c, 0x20, 0x1}, 0x1c}}, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ffe6, 0x0) 21:47:12 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000000c0)=@hat={'changehat '}, 0x1d) 21:47:12 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x6, 0x301}, 0x14}}, 0x0) 21:47:12 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x4, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 21:47:12 executing program 3: io_setup(0x10000, &(0x7f0000000180)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, 0x0, 0x30044804) 21:47:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x6, 0x301}, 0x14}}, 0x0) 21:47:13 executing program 2: syz_open_dev$loop(&(0x7f0000000580), 0x0, 0x412002) 21:47:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020855260000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:13 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020001f0800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:13 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_mr_vif\x00') lseek(r0, 0x2, 0x0) 21:47:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x3, 0x6, 0x301}, 0x14}}, 0x0) 21:47:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208b6260000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:13 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x3, &(0x7f0000000040), 0x4) 21:47:13 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_mreq(r0, 0x29, 0x1, 0x0, &(0x7f0000001340)) 21:47:13 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f000001f600), 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='.\x00', 0x0) 21:47:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x1c, 0x5, 0x6, 0xb03, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 21:47:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002083b270000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:13 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000400800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:13 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0x4, &(0x7f0000002780)=0x0) io_submit(r1, 0x1, &(0x7f0000002500)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 21:47:13 executing program 5: inotify_init() inotify_init1(0x0) 21:47:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x1c, 0x5, 0x6, 0xb03, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 21:47:13 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$AUDIT_USER_TTY(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x24048800) 21:47:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208b0270000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:13 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00'}, 0x10) process_vm_writev(0xffffffffffffffff, &(0x7f0000000080), 0x5, 0x0, 0x0, 0x0) 21:47:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x1c, 0x5, 0x6, 0xb03, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 21:47:13 executing program 5: syz_emit_ethernet(0x1e2, &(0x7f0000000140)={@local, @multicast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "52768d", 0x1ac, 0x6, 0x0, @dev={0xfe, 0x80, '\x00', 0xe}, @ipv4={'\x00', '\xff\xff', @empty}, {[@routing={0x0, 0x2, 0x1, 0x4, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}]}, @fragment={0x2c, 0x0, 0x32, 0x0, 0x0, 0x8, 0x65}, @routing={0x3c, 0xc, 0x1, 0x0, 0x0, [@private0={0xfc, 0x0, '\x00', 0x1}, @empty, @remote, @private2, @local, @mcast1]}, @srh={0x3b, 0x0, 0x4, 0x0, 0x9, 0x30}, @hopopts={0x0, 0x5, '\x00', [@calipso={0x7, 0x20, {0x1, 0x6, 0x5, 0x0, [0x7c, 0xd39, 0xa9]}}, @padn={0x1, 0x1, [0x0]}, @ra={0x5, 0x2, 0x81}, @jumbo={0xc2, 0x4, 0x8}]}, @routing={0x0, 0x2, 0x1, 0x8, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}]}, @dstopts={0x11, 0x7, '\x00', [@calipso={0x7, 0x8, {0x0, 0x0, 0x5, 0x800}}, @generic={0x0, 0x1b, "3d60f37b3693ed222ed350fbc9d69e8d62a4620255d74f5f8d121a"}, @hao={0xc9, 0x10, @private1={0xfc, 0x1, '\x00', 0x1}}]}, @hopopts={0x32}], {{0x4e24, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0xe, 0x86, 0x0, 0x0, 0xffe5, {[@sack_perm={0x4, 0x2}, @sack={0x5, 0xe, [0x0, 0x5, 0x360]}, @sack_perm={0x4, 0x2}, @window={0x3, 0x3, 0x4}, @generic={0x2, 0xd, "7fb925ac32a8168d1312f3"}]}}, {"09e66c9d213db1e537131fb37e37ca7d8902b873a0477a3f15e9848fa84bff04a7ba34732747bd4f0793db65ccdd9a0e03fdbd784653266a35984c29d8d227471bba4a7d"}}}}}}}, 0x0) 21:47:13 executing program 3: syz_open_procfs(0x0, &(0x7f00000011c0)='net/ip_mr_vif\x00') 21:47:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00') lseek(r0, 0xff, 0x0) 21:47:13 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x1c, 0x5, 0x6, 0xb03, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 21:47:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000030800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:14 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/psched\x00') lseek(r0, 0xfb, 0x0) 21:47:14 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f00000004c0)={0x10, 0x0, {0x0, 0x0, 0x0, {}, {}, @rumble}, {0x0, 0x0, 0x0, {}, {}, @ramp}}) 21:47:14 executing program 2: syz_open_dev$loop(&(0x7f0000000680), 0x0, 0x2) 21:47:14 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208273b0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:14 executing program 0: set_mempolicy(0x2, &(0x7f0000002100)=0x9, 0x3) syz_open_procfs$namespace(0x0, &(0x7f0000002080)='ns/pid_for_children\x00') 21:47:14 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000000c0)=@abs, 0x6e) 21:47:14 executing program 0: set_mempolicy(0x2, &(0x7f0000002100)=0x9, 0x3) syz_open_procfs$namespace(0x0, &(0x7f0000002080)='ns/pid_for_children\x00') 21:47:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000000)=0x10001, 0x4) 21:47:14 executing program 3: openat$fuse(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) 21:47:14 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208003f0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:14 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_getaddr={0x18, 0x16, 0x1}, 0x18}}, 0x0) 21:47:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000040800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:14 executing program 0: set_mempolicy(0x2, &(0x7f0000002100)=0x9, 0x3) syz_open_procfs$namespace(0x0, &(0x7f0000002080)='ns/pid_for_children\x00') 21:47:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x8, 0x6, 0x301}, 0x14}}, 0x0) 21:47:14 executing program 5: r0 = getpgid(0x0) sched_setscheduler(r0, 0x0, &(0x7f0000000000)=0x5) 21:47:14 executing program 2: r0 = epoll_create(0x200) r1 = socket$inet_udplite(0x2, 0x2, 0x88) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 21:47:14 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800400000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:14 executing program 5: r0 = getpgid(0x0) rt_tgsigqueueinfo(r0, r0, 0x0, &(0x7f0000000080)) 21:47:14 executing program 3: set_mempolicy(0x3, &(0x7f0000000000)=0x8001, 0x2) syz_open_procfs(0x0, &(0x7f0000000040)='net/raw\x00') [ 742.402193] __ntfs_error: 129 callbacks suppressed [ 742.402205] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:47:14 executing program 2: io_setup(0x74, &(0x7f0000002140)=0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) io_submit(r0, 0x1, &(0x7f0000002a40)=[&(0x7f0000002200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x2}]) 21:47:14 executing program 0: set_mempolicy(0x2, &(0x7f0000002100)=0x9, 0x3) syz_open_procfs$namespace(0x0, &(0x7f0000002080)='ns/pid_for_children\x00') [ 742.479792] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:47:14 executing program 5: process_vm_writev(0x0, &(0x7f0000000580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0, 0xfffffebe}], 0x9, 0x0, 0x0, 0x0) 21:47:14 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x24, 0x1, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_MARK_MASK={0x8}, @CTA_MARK={0x8}]}, 0x24}}, 0x0) [ 742.535740] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 742.672299] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 742.683332] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 742.697088] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 742.858486] ntfs: (device loop1): is_boot_sector_ntfs(): Invalid end of sector marker. [ 742.879137] ntfs: (device loop1): ntfs_read_inode_mount(): Device read failed. [ 742.886913] ntfs: (device loop1): ntfs_read_inode_mount(): Failed. Marking inode as bad. [ 742.896835] ntfs: (device loop1): ntfs_fill_super(): Failed to load essential metadata. 21:47:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000070800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netstat\x00') lseek(r0, 0xff, 0x0) 21:47:15 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x9, 0x6, 0x5}, 0x14}}, 0x0) 21:47:15 executing program 0: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x40401, 0x0) 21:47:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x14, 0x2, 0x9, 0x3}, 0x14}}, 0x0) 21:47:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800480000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:15 executing program 2: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100)={0x0, "79a903e170f5b1e9b60a36f09b14bc8f3234f251a093bf25bba919cfdc9c30ff5a6ce29f3e0b722e5d946ce39f72cb69450313f5518009dd0c2dd3ac3cc330cd"}, 0x48, 0xffffffffffffffff) r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "50a76e16f02ad1157c655ac8ccb208eb3e3570b7e0269221498e6fd80b719dd9fb8dc0a47fba3e6998ed95d5170c93742e6c164c59919cff6e771fec1bbcfe59"}, 0x48, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000200), 0x0, 0x0, 0x0, r0) 21:47:15 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ptype\x00') read$FUSE(r0, &(0x7f0000004300)={0x2020}, 0x2020) 21:47:15 executing program 3: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/mnt\x00') 21:47:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udplite6\x00') lseek(r0, 0x40004, 0x0) 21:47:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208004c0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:15 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000100)=0x1) 21:47:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000080800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:15 executing program 0: syz_emit_ethernet(0x36, &(0x7f0000000100)={@link_local, @link_local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @local, @rand_addr, @multicast, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x0) 21:47:15 executing program 3: socket(0x2, 0x0, 0x7fff) 21:47:15 executing program 5: io_setup(0x1, &(0x7f0000000000)=0x0) io_cancel(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 21:47:15 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/partitions\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 21:47:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020826550000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:15 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) bind$unix(r0, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) 21:47:15 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@deltaction={0x14}, 0x55}}, 0x0) 21:47:15 executing program 2: socket$inet(0x2, 0x803, 0x1) 21:47:15 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000011c0)='net/ip_mr_vif\x00') r1 = getpgrp(0x0) r2 = getpgrp(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000040)) 21:47:15 executing program 3: request_key(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)='rxrpc\x00', 0x0) 21:47:15 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002080)='auxv\x00') read$FUSE(r0, 0x0, 0x0) 21:47:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000f0800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020822600000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_getaddr={0x2c, 0x16, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @empty}]}, 0x2c}}, 0x0) 21:47:16 executing program 3: mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000), 0x0) 21:47:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000008c0)=@filter={'filter\x00', 0xe, 0x4, 0x368, 0xffffffff, 0x0, 0xf8, 0x0, 0xffffffff, 0xffffffff, 0x298, 0x298, 0x298, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private2, @local, [], [], 'batadv_slave_1\x00', 'team0\x00', {}, {}, 0x6}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@inet=@ecn={{0x28}, {0x20}}]}, @REJECT={0x28}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'ip6gretap0\x00', 'bond0\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) r1 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20048044, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000040), 0x4) 21:47:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x1c, 0xa, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 743.842609] x_tables: duplicate underflow at hook 2 21:47:16 executing program 3: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) dup3(r0, r1, 0x0) 21:47:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_getaddr={0x2c, 0x16, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @empty}]}, 0x2c}}, 0x0) 21:47:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800680000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 743.887937] x_tables: duplicate underflow at hook 2 21:47:16 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x1c, 0x0, 0x5, 0x3, 0x0, 0x0, {}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 21:47:16 executing program 2: sendmsg$nl_netfilter(0xffffffffffffffff, 0x0, 0xfdc472b2aba10b7c) 21:47:16 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/ipc\x00') 21:47:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000100800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x20, 0x1, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_MASTER={0x4}]}, 0x20}}, 0x0) 21:47:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_getaddr={0x2c, 0x16, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @empty}]}, 0x2c}}, 0x0) 21:47:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000100)=@ipv4_newrule={0x1c, 0x20, 0x1, 0x0, 0x0, {0x2, 0x20}}, 0x1c}}, 0x0) 21:47:16 executing program 3: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000640)=@security={'security\x00', 0xe, 0x4, 0x370, 0xffffffff, 0x1d8, 0x1d8, 0x1d8, 0xffffffff, 0xffffffff, 0x2d8, 0x2d8, 0x2d8, 0xffffffff, 0x4, 0x0, {[{{@ip={@multicast2, @local, 0x0, 0x0, 'netdevsim0\x00', 'sit0\x00'}, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@unspec=@state={{0x28}}, @common=@ttl={{0x28}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x7f}}}, {{@ip={@empty, @private, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_to_bridge\x00', {}, {0xff}}, 0x0, 0x90, 0xf0, 0x0, {}, [@common=@socket0={{0x20}}]}, @common=@SET={0x60}}, {{@uncond, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@set={{0x40}}, @common=@icmp={{0x28}, {0x0, "18e3"}}]}, @common=@unspec=@AUDIT={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3d0) 21:47:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208006c0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:16 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$perf(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x12, r0, 0x0) [ 744.442865] x_tables: duplicate underflow at hook 2 21:47:16 executing program 3: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f00000001c0)='.\x00', 0x424) 21:47:16 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x20, 0x1, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_MASTER={0x4}]}, 0x20}}, 0x0) 21:47:16 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_getaddr={0x2c, 0x16, 0x1, 0x0, 0x0, {}, [@IFA_LOCAL={0x14, 0x2, @empty}]}, 0x2c}}, 0x0) 21:47:16 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_targets\x00') read$FUSE(r0, &(0x7f0000004300)={0x2020}, 0x2020) read$FUSE(r0, 0x0, 0x0) 21:47:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800740000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000140800000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') lseek(r0, 0x400000007bff, 0x0) 21:47:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x20, 0x1, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_MASTER={0x4}]}, 0x20}}, 0x0) 21:47:17 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)={0x18, 0x1, 0x1, 0x5, 0x0, 0x0, {}, [@CTA_LABELS={0x4}]}, 0x18}}, 0x0) 21:47:17 executing program 0: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x3000120) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x3000120) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='.\x00', 0x3000120) 21:47:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208007a0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:17 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "a9ed00", 0x8, 0x0, 0x0, @local, @mcast2, {[@routing={0x0, 0x0, 0x0, 0xbc}]}}}}}, 0x0) 21:47:17 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)={0x20, 0x1, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_MASTER={0x4}]}, 0x20}}, 0x0) 21:47:17 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) set_mempolicy(0x1, 0x0, 0x5) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc08c5332, &(0x7f0000000180)={{}, 'port0\x00'}) 21:47:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') lseek(r0, 0x400000007bff, 0x0) 21:47:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)={0x18, 0x32, 0x441303dc9f489971, 0x0, 0x0, "", [@nested={0x7, 0x0, 0x0, 0x1, [@generic="5c833f"]}]}, 0x18}], 0x1}, 0x0) 21:47:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x9, 0x3, 0x398, 0x248, 0xffffffff, 0xffffffff, 0x248, 0xffffffff, 0x300, 0xffffffff, 0xffffffff, 0x300, 0xffffffff, 0x3, 0x0, {[{{@uncond, 0x0, 0x1e8, 0x248, 0x0, {}, [@common=@inet=@hashlimit2={{0x150}, {'wg2\x00', {0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xffff07a0, 0x0, 0x80}}}, @inet=@rpfilter={{0x28}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @broadcast}}}, {{@uncond, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x3f8) [ 745.085351] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 745.124617] tc_dump_action: action bad kind [ 745.167267] x_tables: duplicate underflow at hook 3 21:47:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020803850000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') lseek(r0, 0x400000007bff, 0x0) 21:47:17 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000480)=0x4, 0x4) 21:47:17 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00'}) 21:47:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020200000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:17 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002180)='net/icmp6\x00') lseek(r0, 0xff, 0x0) 21:47:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:17 executing program 0: unshare(0x400) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x7001, 0x0) 21:47:17 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') lseek(r0, 0x400000007bff, 0x0) 21:47:17 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) flistxattr(r1, 0x0, 0x0) 21:47:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020803870000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:17 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) 21:47:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_getres(0x0, 0x0) 21:47:17 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000080)={[{@fat=@debug}]}) 21:47:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020803880000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020300000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x18090600) 21:47:18 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000200), 0x3, 0x0, 0x0, 0x0, 0x0) 21:47:18 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r1, r0, 0x0, 0x3effffffc) 21:47:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020803890000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:18 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r3, &(0x7f0000000200), 0xf000) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000300)=""/167, 0xa7}, {&(0x7f0000000040)=""/1, 0x1}, {&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000180)=""/34, 0x22}, {&(0x7f0000000240)=""/101, 0x65}, {&(0x7f00000003c0)=""/110, 0x6e}, {&(0x7f0000000440)=""/99, 0x63}, {&(0x7f00000004c0)=""/112, 0x70}], 0x8, 0x9, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 21:47:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) set_mempolicy(0x1, &(0x7f0000000180)=0xfff, 0x5) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\trust\xe3c*sgrVex:De', 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000180)={{}, 'port0\x00'}) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) read(r0, &(0x7f0000000080)=""/238, 0xee) 21:47:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:18 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_settime(0x0, 0x0) 21:47:18 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x387b1d0849878266, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, &(0x7f0000000000), 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000b20000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f00009c9000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 21:47:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208038a0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020400000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:19 executing program 0: epoll_create1(0x0) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, @perf_bp, 0x11010, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='gid_map\x00') r2 = socket$inet(0x2, 0x3, 0x2) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200001c0], 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]}, 0x177) openat$hwrng(0xffffff9c, &(0x7f0000000180), 0x40a002, 0x0) write$P9_RGETLOCK(r1, 0x0, 0x0) r3 = dup2(r1, r0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000300)={'filter\x00', 0x0, 0x0, 0x0, [0x0, 0x0, 0x9, 0x3, 0x1, 0x2]}, 0x0) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f00000001c0)={0x1, &(0x7f0000000280)=[{0x6, 0x3, 0x0, 0x8000000006}]}, 0x10) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x240540c3, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) openat$null(0xffffff9c, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x48001, 0x0, 0xfffffe91) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) sendto$inet6(r4, &(0x7f0000000400)='\t', 0x1, 0x20042041, &(0x7f0000000240)={0xa, 0x4e24, 0x0, @local, 0x3}, 0x1c) poll(&(0x7f0000000000)=[{r4}], 0x1, 0xef) close(r4) 21:47:19 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0xfdef) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x0, 0xffff}) ioctl$FITRIM(r1, 0x40305839, &(0x7f0000000000)={0x0, 0x8001, 0xaaf9}) 21:47:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208038b0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:19 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0x0, 0x0) 21:47:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpriority(0x1, 0x0) 21:47:19 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000480), &(0x7f00000004c0)) 21:47:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0xffffffffffffffff, 0x0) 21:47:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_getevents(0x0, 0x0, 0x0, 0x0, 0x0) 21:47:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208038c0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0x0, 0x0) 21:47:19 executing program 3: syz_read_part_table(0x0, 0x6, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac0000ffffffa5000800000000000000024000ffffff82000000e10000008877007200300700a6ffffff00000000008000da55aa", 0x40, 0x1c0}]) 21:47:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020500000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000100)=0x9, 0x6, 0x2) 21:47:19 executing program 5: timer_create(0x0, 0x0, &(0x7f0000000500)) timer_gettime(0x0, 0x0) 21:47:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpriority(0x2, 0x0) 21:47:19 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') lseek(r0, 0x1, 0x0) 21:47:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208038d0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:19 executing program 2: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="240000002400074c8bfffd946fa2830022200afffffffffffff000e50c1be3a20400007e", 0x24}], 0x1}, 0x0) 21:47:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpriority(0x2, 0x0) 21:47:19 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x400) r0 = socket(0x10, 0x3, 0x0) write(r0, 0x0, 0x0) 21:47:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020803a80000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpriority(0x2, 0x0) 21:47:19 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x387b1d0849878266, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f000078e000/0x2000)=nil, 0x2000, 0x1000000, 0xffffffffffffffff) pkey_mprotect(&(0x7f00009c9000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) [ 747.447631] __ntfs_error: 143 callbacks suppressed [ 747.447643] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 747.481499] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 747.727294] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 747.835966] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 747.865544] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 747.884394] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 21:47:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020600000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:20 executing program 5: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="240000002e00074c8bfffd946fa2830022200afffffffffffff000e50c1be3a20400007e280000005e00ff03c81f8374b4", 0x31}, {&(0x7f0000000240)="971db4e786948f23508ff65e63700de9fb31be10e096f10b69", 0x19}, {&(0x7f0000000280)="e965", 0x2}], 0x3}, 0x0) 21:47:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') lseek(r0, 0x1, 0x0) 21:47:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpriority(0x2, 0x0) 21:47:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020827b00000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r1, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x29, &(0x7f0000000180)="98a2cd9e00550f47e89aea8bff07000000000000b50cec00000000000000a77694bd9d4530fea39ab7"}}], 0x1c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) 21:47:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') lseek(r0, 0x1, 0x0) [ 748.063544] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:47:20 executing program 5: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="240000002e00074c8bfffd946fa2830022200afffffffffffff000e50c1be3a20400007e280000005e00ff03c81f8374b4", 0x31}, {&(0x7f0000000240)="971db4e786948f23508ff65e63700de9fb31be10e096f10b69", 0x19}, {&(0x7f0000000280)="e965", 0x2}], 0x3}, 0x0) 21:47:20 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x0) [ 748.107090] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 748.136340] ptrace attach of "/root/syz-executor.2"[17496] was attempted by "/root/syz-executor.2"[17498] 21:47:20 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x400) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) 21:47:20 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/softnet_stat\x00') lseek(r0, 0x1, 0x0) [ 748.171362] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:47:20 executing program 5: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="240000002e00074c8bfffd946fa2830022200afffffffffffff000e50c1be3a20400007e280000005e00ff03c81f8374b4", 0x31}, {&(0x7f0000000240)="971db4e786948f23508ff65e63700de9fb31be10e096f10b69", 0x19}, {&(0x7f0000000280)="e965", 0x2}], 0x3}, 0x0) [ 748.234974] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 748.391658] ieee802154 phy0 wpan0: encryption failed: -22 [ 748.397359] ieee802154 phy1 wpan1: encryption failed: -22 21:47:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020700000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:20 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sysvipc/sem\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x2}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r0, &(0x7f00000017c0), 0x3ca, 0x48, 0x0) 21:47:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020826b60000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:20 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) nanosleep(0x0, 0x0) 21:47:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0xffffffff, 0x0) 21:47:20 executing program 5: r0 = socket$inet(0x10, 0x2000000002, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)="240000002e00074c8bfffd946fa2830022200afffffffffffff000e50c1be3a20400007e280000005e00ff03c81f8374b4", 0x31}, {&(0x7f0000000240)="971db4e786948f23508ff65e63700de9fb31be10e096f10b69", 0x19}, {&(0x7f0000000280)="e965", 0x2}], 0x3}, 0x0) 21:47:20 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000001c0), 0x1, 0x1) write$cgroup_freezer_state(r0, &(0x7f0000000240)='FREEZING\x00', 0x9) 21:47:21 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x29, &(0x7f0000000180)="98a2cd9e00550f47e89aea8bff07000000000000b50cec00000000000000a77694bd9d4530fea39ab7"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:47:21 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000480)=@file={0x1, './file0\x00'}, 0x6e) listen(r0, 0x0) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) 21:47:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000100)) 21:47:21 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="8e0ee867081b28309b074a", 0x12e9}], 0x1) 21:47:21 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208c0ed0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 748.668862] ptrace attach of "/root/syz-executor.2"[17554] was attempted by "/root/syz-executor.2"[17555] 21:47:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0xc00) 21:47:21 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x387b1d0849878266, 0x8031, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f00009c9000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f00004b7000/0x1000)=nil, 0x1000, 0x0, r0) pkey_mprotect(&(0x7f00009c9000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 21:47:21 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x36, &(0x7f0000000180)="98a2cd9e00550f47e89aea8bff07000000000000b50cec00000000000000a77694bd9d4530fea39ab76346a4ac51238f17ddb47dc336"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 21:47:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020900000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:21 executing program 2: mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, &(0x7f00000000c0)=0x1, 0x4, 0x0) 21:47:21 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002080fff0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:21 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpriority(0x0, 0x0) 21:47:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgrcv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 21:47:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_getres(0xa00, 0x0) [ 749.046831] ptrace attach of "/root/syz-executor.3"[17598] was attempted by "/root/syz-executor.3"[17599] 21:47:21 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000080), 0x10) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) 21:47:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000740)={0x9, 0x2, 0x0, 0xa1b4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3}, 0x40) 21:47:21 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000200000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:21 executing program 3: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f0000003940)={'syztnl0\x00', 0x0}) 21:47:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {}]}]}}, &(0x7f00000022c0)=""/151, 0x36, 0x97, 0x1}, 0x20) 21:47:22 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, 0x0) 21:47:22 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x17, 0x0, 0x400, 0xfff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2}, 0x40) 21:47:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') lseek(r0, 0xa3, 0x0) 21:47:22 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000400000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:22 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020a00000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:22 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x20100) 21:47:22 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) sendmsg$IEEE802154_SET_MACPARAMS(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x38, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_TXPOWER={0x5}, @IEEE802154_ATTR_CSMA_MAX_BE={0x5}, @IEEE802154_ATTR_CSMA_MIN_BE={0x5}]}, 0x38}}, 0x0) 21:47:22 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000100), 0xc) 21:47:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000003140)={0x2}, 0x88) 21:47:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x80, 0x0, 0x0) 21:47:22 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000e00000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x2, 0x7, 0x101}, 0x14}}, 0x0) 21:47:22 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000013c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x20, 0x3, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}]}, @NFT_MSG_NEWSET={0x30, 0x9, 0xa, 0x5, 0x0, 0x0, {0x2}, [@NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0xb8726fc899ea91c6}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x5}, @NFTA_SET_KEY_TYPE={0x8, 0x4, 0x1, 0x0, 0xf0}]}, @NFT_MSG_NEWSET={0x24, 0x9, 0xa, 0x101, 0x0, 0x0, {0x7, 0x0, 0x5}, [@NFTA_SET_OBJ_TYPE={0x8, 0xf, 0x1, 0x0, 0x1}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x19}]}, @NFT_MSG_NEWSETELEM={0xe28, 0xc, 0xa, 0x0, 0x0, 0x0, {}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xe0c, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}]}, {0xc, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY={0x4}]}, {0x1b8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_USERDATA={0xf4, 0x6, 0x1, 0x0, "56dea082261f65d1cf121d7c48a6ca58b21d77bb5f8b0278cb785f5ee723e672f0e4da99153231b00943d2e0e53b929d72152087414cb3fd522c73462a9afa01bb609d7997afe094d4b17679281e0fc596f25b63ad10bf9a70a5805c5a096b7b662830035fd109e08ee9f109a48127df52583c067c0d83f740b2fb9f984cc617f777e54a8f67e4b7895b966885e2c9580d8ceb506748d3fdb66cb7789c036b1da23af5e89cd2d04d01d9911f38b3e730c44e0799acda4f7add4b4c290c99e3d72a7c224698fef5fdc4b4fbb99774b724313ccdbe60effa49bbdd8a7881e2bcb85b2a9a69e67ea5eb5c1695993573f912"}, @NFTA_SET_ELEM_DATA={0xc0, 0x2, 0x0, 0x1, [@NFTA_DATA_VERDICT={0x4c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}, @NFTA_DATA_VALUE={0x51, 0x1, "4d52686f3605836a39d43599201f1c0250083f27405bfc3ebb49c5f1db766a8df496bf5996e2f3b9fc5e8ca83badb8c6adace96bc6e7528c058e5d73ca94880d2251bad639b411c6ba5fa06694"}, @NFTA_DATA_VERDICT={0x1c, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}]}]}]}, {0x74, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPR={0x4}, @NFTA_SET_ELEM_KEY_END={0x6c, 0xa, 0x0, 0x1, [@NFTA_DATA_VALUE={0xc, 0x1, "0f8828eceb0f0d72"}, @NFTA_DATA_VERDICT={0x54, 0x2, 0x0, 0x1, [@NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz1\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffc}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz0\x00'}, @NFTA_VERDICT_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffd}, @NFTA_VERDICT_CODE={0x8, 0x1, 0x0, 0x1, 0xfffffffffffffffe}]}, @NFTA_DATA_VALUE={0x4}, @NFTA_DATA_VALUE={0x4}]}]}, {0xbc8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_EXPIRATION={0xc, 0x5, 0x1, 0x0, 0x400}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz0\x00'}, @NFTA_SET_ELEM_OBJREF={0x9, 0x9, 'syz1\x00'}, @NFTA_SET_ELEM_USERDATA={0x1f, 0x6, 0x1, 0x0, "f53f3eb207115652260ab877eac54175df312d98ee83de6a702063"}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x9}, @NFTA_SET_ELEM_KEY={0xb68, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0xb64, 0x1, "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"}]}]}]}]}], {0x14}}, 0xec4}, 0x1, 0x0, 0x0, 0x80}, 0x8040) 21:47:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x1}]}, @int={0x0, 0x0, 0x0, 0x1, 0x0, 0x4c, 0x0, 0x75}]}}, &(0x7f0000000040)=""/129, 0x4e, 0x81, 0x1}, 0x20) 21:47:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x2, 0x7, 0x101}, 0x14}}, 0x0) 21:47:22 executing program 2: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) sendto$netrom(r0, 0x0, 0x0, 0x20000050, 0x0, 0x0) 21:47:22 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020b00000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:22 executing program 3: syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(0x0, 0xffffffffffffffff) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000bc0)={0x0, 0x0, 0x0}, 0x0) 21:47:22 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000080), 0x10) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f00000000c0)=[{{}, {0x4}}, {{0x0, 0x0, 0x1}, {0x0, 0x0, 0x1}}], 0x10) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) 21:47:22 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x2, 0x7, 0x101}, 0x14}}, 0x0) 21:47:22 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208ffff1f00000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:22 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x13, 0x0, &(0x7f0000000040)) 21:47:23 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x2, 0x7, 0x101}, 0x14}}, 0x0) 21:47:23 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_DISASSOCIATE_REQ(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 21:47:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEV(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000007c0)={'wpan1\x00'}) 21:47:23 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000002480)={0x0, 0x0, 0x0}, 0x10062) 21:47:23 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000008180)) 21:47:23 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000001e40)={0x3, @null, 0xee00}) 21:47:23 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020c00000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:23 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000001000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:23 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f00000003c0), 0x64) listen(r0, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000180)=ANY=[], 0x9) sendmsg$inet_sctp(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000fc0)="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", 0xfff}, {&(0x7f0000000380)="e77eba4a36eeea6cb553cc3b3846397b90c60959d76e", 0x16}], 0x2}, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x18d) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000240)={0x0, 0x5600}, 0x10) sendmsg$inet_sctp(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 21:47:23 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x14}, 0x14}}, 0x0) 21:47:23 executing program 5: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) sendto$ax25(r0, 0x0, 0x0, 0x40000, 0x0, 0x0) 21:47:23 executing program 3: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00'}) r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000003340)) 21:47:23 executing program 0: bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 21:47:23 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) 21:47:23 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000002000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:23 executing program 3: syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000a40), 0xffffffffffffffff) 21:47:23 executing program 0: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) accept(r0, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000003c40)='devices.allow\x00', 0x2, 0x0) 21:47:23 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f0000000180)=0x54) 21:47:23 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020d00000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:23 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f0000000180)=0x54) 21:47:23 executing program 3: accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) socketpair(0x9, 0x0, 0x0, &(0x7f0000001540)) 21:47:23 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000002740)=[{&(0x7f00000000c0)="3a4a3c4fb4f349ea0c9a786268240cf43674d28bff38cf012f690996b3f8d7d3b46dfa323694806f1988c546c9b5a59575316ff9593a6784702e69f22562f745863875b62113da0f8578cc60d8c32358eef920282080a1aea92d66d7439a562a0bf6b4df69513006fcf47f57000000000000d46acb36e41b8fccec16c4f855e6a1b47989e4de5836cb5fb5eff290a8bd524281b190fa943942d4101b54dde1686e57f2ed78c6fe1320aa6ff16c346823945970", 0xb3}, {&(0x7f0000000180)="b37de30de2a4cd32320398f7a386daaff056564826d8078e6968c965b00cab8b891944f0f17e", 0x26}, {&(0x7f00000001c0)="4f0ea14ae963fb06835b268faa778317d3b2756295c37fab377bad90b76edb1b343093c4b4ea5a360d0d469542ae48ad02e25f4ea3e91f2c247a46605fabfd7327ceb3467cdf624299d208457831ca9ed0635ea283536ddf0e8f6a13132dcda8ede7753d3f9876f339de64d720828ef3362de3bb93ef1d534f8fc05ab300414db9695fd5c3a5aec30aee73f00924f53d76806df110", 0x95}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000000400)="4bb8aa73ca6487452b8e793055e9ae23b6af145dbae8f6e986861608e001786e2c5c9552675340bc93ce709d99e39952558b7a2c7a68e05c99a15aebcebe48a515ffd684b40384eb299b4260831a7e1872196ca3981a443c861b6c04d73e45ed99cc312807", 0x65}, {&(0x7f0000002a80)="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", 0x18d}, {&(0x7f0000001740)="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", 0x2b1}], 0x7}, 0x0) 21:47:23 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000003000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000080)=0x9, 0x4) 21:47:24 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0xfffffffffffffffc}}, 0x0) 21:47:24 executing program 5: connect$pppl2tp(0xffffffffffffffff, 0x0, 0x0) 21:47:24 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000004000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:24 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f0000000180)=0x54) 21:47:24 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000003a00)={'ip6tnl0\x00', 0x0}) 21:47:24 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, 0x0, &(0x7f00000000c0)) 21:47:24 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020e00000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:24 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x2, 0x0, 0x0, 0xdb4f}, 0x40) 21:47:24 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000600), 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000002500)=@mangle={'mangle\x00', 0x1f, 0x6, 0x610, 0x0, 0x218, 0x218, 0x120, 0x408, 0x540, 0x540, 0x540, 0x540, 0x540, 0x6, 0x0, {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @local}, [], [], 'vlan0\x00', 'wlan0\x00'}, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@ah={{0x30}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4=@multicast1}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @HL={0x28}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @loopback, [], [], 'veth1_to_batadv\x00', 'veth0_to_team\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @inet=@TOS={0x28}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@ipv6header={{0x28}}]}, @common=@unspec=@NFQUEUE1={0x28}}, {{@ipv6={@dev, @mcast2, [], [], 'veth0\x00', 'ip6tnl0\x00'}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@dst={{0x48}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@loopback}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x670) socketpair(0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000008300), 0xffffffffffffffff) 21:47:24 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f0000000180)=0x54) 21:47:24 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 752.234527] x_tables: duplicate underflow at hook 1 [ 752.246153] x_tables: duplicate underflow at hook 1 21:47:24 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000005000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:24 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) 21:47:24 executing program 0: syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 21:47:24 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040)=0x9a52, 0x4) bind$can_raw(r0, &(0x7f0000000000), 0x10) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) close(r0) 21:47:24 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[], 0x14f5a37) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='nv\x00', 0x3) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0x1801, 0x4) sendmmsg(r1, &(0x7f0000004800)=[{{0x0, 0x0, &(0x7f0000002d00)=[{&(0x7f0000000200)="046837a94c18418c35f9fed27f3f1b0ac0e5d3127ce99d08bde4fb5e148532910895d8d492510fbc626ae415bf2bb16ba6aff62613a4e16d1081cbbcf04dfa425c52db999c72fb355ac34fe9848d3ae03b6a66da5501992ed3457ce9abbe094afb982c78025d321b2f0b96e2c5bad1d816fa44e95923c19cdec8dca5a4f540cf40f16924760af50631b90ea49c76d3d0a42991339bd4ba97ed666c4601be6586a12a86a7bcef4ad3a859cc8f075972259f3d9a4cb40c56ece56a67ecdc924b2cdee2946b2d83c43ac3", 0xc9}], 0x1}}], 0x1, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) 21:47:24 executing program 3: socket$inet6(0xa, 0x0, 0xfffffff8) 21:47:24 executing program 0: syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) [ 752.608014] __ntfs_error: 110 callbacks suppressed [ 752.608025] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 752.624622] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 752.640610] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 752.702483] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 752.711538] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 752.734382] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 21:47:25 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000021000000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={0x0, &(0x7f00000006c0)=""/4, 0x0, 0x4}, 0x20) 21:47:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000006000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:25 executing program 0: syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 21:47:25 executing program 3: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="5500000018007f5f14fe01b2a49b90930214040200101301041614053900090035000c0701000000190005400460ffff000a00000000014883139b84134ef75adb83de4411000bff", 0x48}, {&(0x7f00000000c0)="00ffff00000000000000130200", 0xd}], 0x2, 0x0, 0x0, 0xf000000}, 0x0) 21:47:25 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x1d, r3}, 0x10, &(0x7f00000000c0)={0x0}}, 0x0) 21:47:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) [ 752.888223] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 752.913494] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:47:25 executing program 0: syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket$isdn_base(0x22, 0x3, 0x0) ioctl$IMGETCOUNT(r0, 0x80044943, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f00000005c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 21:47:25 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, '\x00H\xcc\x00\x00\x00\xe2\x00\x00\xff'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback={0x300000000f000}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1={0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x54}}, 0x0) [ 752.954639] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 752.981004] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.5'. [ 753.039438] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:47:25 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040)=0x9a52, 0x4) bind$can_raw(r0, &(0x7f0000000000), 0x10) 21:47:25 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/user\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/user\x00') 21:47:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000880)={&(0x7f00000000c0)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f0000000800)=[@dstaddrv4={0x10, 0x84, 0x9, @multicast2}], 0x10}, 0x0) 21:47:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@get={0x1, 0x0, 0x7ff}) 21:47:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000007000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:25 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000021100000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:25 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, 0x0) 21:47:25 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000003380)={'macsec0\x00', {0x2, 0x0, @multicast1}}) 21:47:25 executing program 0: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x1) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r0, 0x0, 0x1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 21:47:25 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) sendmsg$IPSET_CMD_TEST(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000003100)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000b06010300000000000000000000000005000100070000000900020073797a3000000000100007800c000180"], 0x38}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r2, r1, 0x0, 0x100000001) 21:47:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8914, &(0x7f0000000040)={'wg2\x00'}) 21:47:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000008000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:25 executing program 5: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) accept4(r0, 0x0, 0x0, 0x80000) 21:47:25 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x12) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) sendfile(r1, r0, &(0x7f0000000240)=0xab78, 0x1) 21:47:26 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x3, &(0x7f0000000040), 0x4) 21:47:26 executing program 0: syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x0, 0x0) 21:47:26 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x2, 0x0, 0x0) 21:47:26 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000021200000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000009000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:26 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000680), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) 21:47:26 executing program 0: syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) syz_init_net_socket$ax25(0x3, 0x0, 0x0) 21:47:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x3, &(0x7f0000000900)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000980)='syzkaller\x00', 0x4, 0x8f, &(0x7f0000001a40)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:47:26 executing program 5: bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f00000003c0), 0xffffffffffffffff) pipe(&(0x7f0000000400)) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x18, 0x0, 0x0, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x33745096ad245d2d}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000e40)={0x77359400}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 21:47:26 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x0) 21:47:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000480)={'wpan4\x00'}) 21:47:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000013000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:26 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8922, &(0x7f0000000680)={'lo\x00', @ifru_names}) 21:47:26 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000080), 0x10) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000000)=0x6d3, 0x4) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000040), 0x4) 21:47:26 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xc, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:47:26 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000021400000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:26 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000240)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0xe0}, 0x9c) 21:47:26 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r0, 0x0, 0x0) 21:47:26 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000080), 0x10) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f0000000040)=[{{0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{0x0, 0x1}}], 0x10) 21:47:26 executing program 5: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'batadv_slave_0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000380)={'syztnl2\x00', r0, 0x2f, 0xff, 0x80, 0x80000000, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x33}, 0x7, 0x80, 0x5b5d4d30, 0xad5546a}}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x10, &(0x7f0000000540)={&(0x7f0000000440)=""/225, 0xe1}}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000700)={&(0x7f00000005c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa1, 0xa1, 0x9, [@restrict={0x6, 0x0, 0x0, 0xb, 0x5}, @datasec={0x5, 0x1, 0x0, 0xf, 0x2, [{0x1, 0x40, 0x1f}], "1400"}, @var={0x6, 0x0, 0x0, 0xe, 0x1, 0x1}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xc, 0x2}]}, @datasec={0x6, 0x2, 0x0, 0xf, 0x3, [{0x2, 0x9, 0x4}, {0x1, 0x9, 0x2}], '\r9('}, @restrict={0xe, 0x0, 0x0, 0xb, 0x2}, @struct={0x10, 0x2, 0x0, 0x4, 0x0, 0x200, [{0xa, 0x5, 0x7}, {0xb, 0x1, 0x5}]}]}, {0x0, [0x30, 0x2e, 0x0, 0x5f, 0x2e, 0x0, 0x2e]}}, &(0x7f00000006c0)=""/4, 0xc5, 0x4, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000740)={0x9, 0x2, 0xffffffc8, 0xa1b4, 0x0, 0xffffffffffffffff, 0xf, '\x00', 0x0, r2, 0x1, 0x3, 0x2}, 0x40) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000c40)={'ip6gre0\x00', &(0x7f0000000bc0)={'syztnl0\x00', 0x0, 0x2f, 0x1, 0x3f, 0x5, 0x30, @loopback, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7800, 0x40, 0x7fffffff, 0xfffffc01}}) ioctl$SIOCX25GFACILITIES(0xffffffffffffffff, 0x89e2, &(0x7f0000000c80)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000cc0)) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000003240), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000003300)={&(0x7f0000003200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000032c0)={&(0x7f0000003280)={0x2c, r4, 0x200, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}, @L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x1) r5 = socket$inet6(0xa, 0x6, 0xfffffff8) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000003340)) ioctl$sock_inet_SIOCSIFDSTADDR(r5, 0x8918, &(0x7f0000003380)={'macsec0\x00', {0x2, 0x0, @multicast1}}) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r5, 0x89fb, &(0x7f0000003940)={'syztnl0\x00', &(0x7f00000038c0)={'ip6tnl0\x00', r1, 0x4, 0xc8, 0x81, 0x4, 0xa, @ipv4={'\x00', '\xff\xff', @local}, @loopback, 0x7, 0x10, 0x0, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r6, 0x89fa, &(0x7f0000003a00)={'ip6tnl0\x00', &(0x7f0000003980)={'syztnl1\x00', r7, 0x2f, 0x5, 0x6, 0x400, 0x4, @ipv4={'\x00', '\xff\xff', @remote}, @dev={0xfe, 0x80, '\x00', 0x25}, 0x8, 0x7800, 0x4, 0x2}}) 21:47:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002080000001f000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:27 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000000a80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000002500)=ANY=[], 0xf8}], 0x1, 0x0) 21:47:27 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000100), 0x4) 21:47:27 executing program 0: syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) 21:47:27 executing program 5: syz_genetlink_get_family_id$nbd(&(0x7f00000003c0), 0xffffffffffffffff) pipe(&(0x7f0000000400)) 21:47:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000020000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:27 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, '\x00H\xcc\x00\x00\x00\xe2\x00\x00\x00'}]}, 0x24}}, 0x0) 21:47:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[], 0x38}}, 0x0) 21:47:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001780)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000380)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000040)='X', 0x1}], 0x1, &(0x7f0000000340)=[@authinfo={0x10}], 0x10}, 0x0) 21:47:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x0, 0x0, 0x7}, 0x8) 21:47:27 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020007000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:27 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000300)={0x0, 0x8e5d78e, &(0x7f0000000080)={&(0x7f0000000280)={0x54, r1, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_DOMAIN={0xe, 0x1, '\x04H\xcc\x00\x00\x00\xe2\x00\x00\x00'}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback={0x300000000f000}}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}]}, 0x54}}, 0x0) 21:47:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000021000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f00000003c0), 0x64) listen(r0, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, 0x0, 0x9) sendmsg$inet_sctp(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000fc0)="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", 0xfe0}], 0x1}, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x18d) 21:47:27 executing program 5: write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'macvlan0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x2e, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 21:47:27 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) listen(r0, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000400)="690dfc135cfb3fdfb31a81a45a06ba2cf367e22c15ea552a169374e3941ba94bdabcc8a2d376608320b50d3506becaf08b193fa48bc68d10ec948735911db8218d7e80d248d0159a84c744f3", 0x4c}, {&(0x7f0000000340)="c2e030bc3b25717c5fcb6aa0ea55", 0xe}, {&(0x7f00000004c0)="6fa903692ff7508648f574a03e87902e4f6d0da5522ed41a7a9270a40879051808d9e80dd7182c5a6e89a3993c0468b862413ba82e029d7a5e1aa5e54ef417", 0x3f}], 0x3}, 0x0) 21:47:27 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_DISASSOCIATE_REQ(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x48}}, 0x0) 21:47:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000023000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:27 executing program 3: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r3, 0x107, 0xf, &(0x7f00000001c0)="a2e6999b", 0x4) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000002480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@deltclass={0xcc0, 0x29, 0x0, 0x0, 0x0, {}, [@tclass_kind_options=@c_red={0x8}, @tclass_kind_options=@c_prio={0x9}, @tclass_kind_options=@c_mq={0x7}, @tclass_kind_options=@c_mq={0x7}, @tclass_kind_options=@c_mqprio={0xb}, @TCA_RATE={0x6}, @tclass_kind_options=@c_cbq={{0x8}, {0xc50, 0x2, [@TCA_CBQ_LSSOPT={0x18}, @TCA_CBQ_LSSOPT={0x18}, @TCA_CBQ_RTAB={0x404}, @TCA_CBQ_RTAB={0x404}, @TCA_CBQ_RATE={0x10}, @TCA_CBQ_RTAB={0x404, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x1]}]}}, @tclass_kind_options=@c_cake={0x9}]}, 0xcc0}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x4ffe0, 0x0) 21:47:27 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f00000003c0), 0x64) listen(r0, 0x1) r1 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r1, &(0x7f0000000000)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000180)=ANY=[], 0x9) sendmsg$inet_sctp(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000fc0)="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", 0xac4}, {&(0x7f0000000380)="e7", 0x1}], 0x2}, 0x0) 21:47:27 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000005400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0x4}, {0xffff, 0xffff}}}, 0x24}}, 0x0) [ 755.264577] IPv6: ADDRCONF(NETDEV_UP): bridge1: link is not ready 21:47:27 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000240)={0x2, {{0x2, 0x0, @multicast2}}, 0x0, 0x1, [{{0x2, 0x0, @local}}]}, 0x110) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000240)={0x2, {{0x2, 0x0, @multicast2}}, 0x0, 0x1, [{{0x2, 0x0, @local}}]}, 0x110) [ 755.317632] bridge1: port 1(macvlan0) entered blocking state [ 755.324320] bridge1: port 1(macvlan0) entered disabled state [ 755.333657] bridge1: port 1(macvlan0) entered blocking state [ 755.339745] bridge1: port 1(macvlan0) entered listening state 21:47:27 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000029f07000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:27 executing program 5: write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'macvlan0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x2e, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 21:47:27 executing program 2: write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'macvlan0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x2e, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 21:47:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002080000273b000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:27 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000300)={&(0x7f0000000100)=@in6={0xa, 0x4e21, 0x0, @private2, 0x7}, 0x80, 0x0}, 0x0) [ 755.637179] IPv6: ADDRCONF(NETDEV_UP): bridge1: link is not ready 21:47:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208b95cba3b000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 755.683571] IPv6: ADDRCONF(NETDEV_UP): bridge2: link is not ready [ 755.692059] bridge1: port 1(macvlan0) entered blocking state [ 755.697919] bridge1: port 1(macvlan0) entered disabled state [ 755.706102] device macvlan0 entered promiscuous mode [ 755.725881] bridge1: port 1(macvlan0) entered blocking state 21:47:28 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, 0x0, 0x0) [ 755.731903] bridge1: port 1(macvlan0) entered listening state [ 755.756544] bridge1: port 1(macvlan0) entered disabled state [ 755.776131] bridge2: port 1(macvlan0) entered blocking state [ 755.787759] bridge2: port 1(macvlan0) entered disabled state 21:47:28 executing program 2: write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'macvlan0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x2e, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) [ 755.851307] bridge2: port 1(macvlan0) entered blocking state [ 755.857270] bridge2: port 1(macvlan0) entered listening state [ 755.974429] IPv6: ADDRCONF(NETDEV_UP): bridge2: link is not ready [ 755.998148] device macvlan0 left promiscuous mode [ 756.004165] bridge1: port 1(macvlan0) entered disabled state [ 756.013315] bridge2: port 1(macvlan0) entered blocking state [ 756.025806] bridge2: port 1(macvlan0) entered disabled state [ 756.034493] device macvlan0 entered promiscuous mode [ 756.048069] bridge2: port 1(macvlan0) entered blocking state [ 756.054489] bridge2: port 1(macvlan0) entered listening state 21:47:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0x4, &(0x7f0000000a80)=@framed={{}, [@jmp={0x4, 0x0, 0x8, 0x0, 0x2}]}, &(0x7f0000000b00)='GPL\x00', 0x5, 0xdd, &(0x7f0000000b40)=""/221, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:47:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002080000003f000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@ipv4_newroute={0x30, 0x18, 0xd37, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@RTA_ENCAP={0x14, 0x16, 0x0, 0x1, @SEG6_IPTUNNEL_SRH={0xd}}]}, 0x30}}, 0x0) 21:47:28 executing program 5: write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'macvlan0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x2e, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) [ 756.177706] IPv6: ADDRCONF(NETDEV_UP): bridge3: link is not ready [ 756.209852] bridge2: port 1(macvlan0) entered disabled state [ 756.218518] bridge3: port 1(macvlan0) entered blocking state [ 756.227183] bridge3: port 1(macvlan0) entered disabled state [ 756.236674] bridge3: port 1(macvlan0) entered blocking state [ 756.242611] bridge3: port 1(macvlan0) entered listening state 21:47:28 executing program 3: syz_genetlink_get_family_id$ipvs(&(0x7f0000001e80), 0xffffffffffffffff) 21:47:28 executing program 2: write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'macvlan0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x2e, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 21:47:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000040000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:28 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) getsockname(r0, &(0x7f0000000040)=@nfc, &(0x7f00000001c0)=0xfffffffffffffffa) 21:47:28 executing program 5: write$binfmt_script(0xffffffffffffffff, 0x0, 0x208e24b) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0xb00000000065808, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'macvlan0\x00', 0x0}) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="19000000000000001c0012000c00010062726964676500000c0002000800050001"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x2e, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_MASTER={0x8, 0xa, r5}]}, 0x28}}, 0x0) 21:47:28 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002ad07000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:28 executing program 3: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) openat$dir(0xffffff9c, &(0x7f0000000080)='./file0\x00', 0x1, 0x0) openat$dir(0xffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) [ 756.390780] IPv6: ADDRCONF(NETDEV_UP): bridge3: link is not ready [ 756.426129] IPv6: ADDRCONF(NETDEV_UP): bridge4: link is not ready 21:47:28 executing program 0: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) 21:47:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000048000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 756.450122] device macvlan0 left promiscuous mode [ 756.467798] bridge2: port 1(macvlan0) entered disabled state [ 756.481898] bridge3: port 1(macvlan0) entered blocking state [ 756.492441] bridge3: port 1(macvlan0) entered disabled state 21:47:28 executing program 3: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000003c0)='./file0\x00', 0x0) utimensat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 756.531531] device macvlan0 entered promiscuous mode [ 756.545711] bridge3: port 1(macvlan0) entered blocking state [ 756.551792] bridge3: port 1(macvlan0) entered listening state 21:47:28 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x0, @local}, 0x0, {0x2, 0x0, @loopback}, 'gretap0\x00'}) [ 756.589232] bridge3: port 1(macvlan0) entered disabled state [ 756.619934] bridge4: port 1(macvlan0) entered blocking state [ 756.646035] bridge4: port 1(macvlan0) entered disabled state [ 756.676765] bridge4: port 1(macvlan0) entered blocking state [ 756.682872] bridge4: port 1(macvlan0) entered listening state 21:47:29 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000340)=@security={'security\x00', 0xe, 0x4, 0x2a8, 0xffffffff, 0x94, 0x0, 0x94, 0xffffffff, 0xffffffff, 0x214, 0x214, 0x214, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x94}, @common=@unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'geneve0\x00', 'veth0_vlan\x00'}, 0x0, 0x70, 0xb0}, @common=@inet=@TCPOPTSTRIP={0x40}}, {{@ip={@private, @multicast2, 0x0, 0x0, 'veth1_to_hsr\x00', 'gretap0\x00'}, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x94}, {0x24}}}}, 0x304) 21:47:29 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002f207000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:29 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_VERDICT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x18, 0x1, 0x3, 0x301, 0x0, 0x0, {}, [@NFQA_EXP={0x4}]}, 0x18}}, 0x0) 21:47:29 executing program 0: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000003c0)='./file0\x00', 0x0) execveat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 21:47:29 executing program 5: add_key$user(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x1}, &(0x7f0000000540)='\t', 0x1, 0xfffffffffffffffe) 21:47:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002080000004c000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:29 executing program 3: openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x40, 0x0) 21:47:29 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)=@buf={0x4c0, &(0x7f0000000c40)="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"}) 21:47:29 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000005c0)=ANY=[@ANYBLOB="84010000140001002cbd7000fbdbdf2502"], 0x184}}, 0x0) 21:47:29 executing program 3: r0 = fork() fork() tgkill(r0, r0, 0x16) tgkill(r0, r0, 0xc) 21:47:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800002655000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040), 0xfffffffffffffefb) 21:47:29 executing program 5: mlock2(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x0) munlock(&(0x7f0000ff8000/0x4000)=nil, 0x4000) fork() mlock2(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x0) 21:47:29 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002000d000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:29 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{}, {0x0, @remote}, 0x20, {0x2, 0x0, @remote}, 'veth0\x00'}) 21:47:29 executing program 0: r0 = openat$full(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000080), r0) 21:47:29 executing program 3: r0 = fork() fork() tgkill(r0, r0, 0x16) tgkill(r0, r0, 0xc) 21:47:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208ffffaa55000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:29 executing program 5: mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0xc4070, 0xffffffffffffffff, 0x0) 21:47:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000400)={@local, 0x0, 0x1, 0x0, 0xe}, 0x20) 21:47:29 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000001640)) 21:47:29 executing program 5: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) 21:47:30 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800002260000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:30 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_triestat\x00') read$FUSE(r0, 0x0, 0x0) 21:47:30 executing program 3: r0 = fork() fork() tgkill(r0, r0, 0x16) tgkill(r0, r0, 0xc) [ 757.742123] __ntfs_error: 129 callbacks suppressed [ 757.742136] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 757.821101] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 757.875528] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 757.934594] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 757.934938] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 757.952054] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 757.954529] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 757.967230] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 757.985618] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 758.073822] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:47:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020fff000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:30 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000080)={'bond_slave_0\x00', @ifru_mtu}) 21:47:30 executing program 5: r0 = socket$inet(0x2, 0x8000a, 0x0) getsockopt$inet_int(r0, 0x0, 0x0, 0x0, 0x0) 21:47:30 executing program 0: syz_open_procfs(0x0, &(0x7f0000000100)='smaps_rollup\x00') 21:47:30 executing program 3: r0 = fork() fork() tgkill(r0, r0, 0x16) tgkill(r0, r0, 0xc) 21:47:30 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000068000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:30 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, 0x0, &(0x7f00000001c0)) 21:47:30 executing program 0: r0 = openat$full(0xffffff9c, &(0x7f0000000c00), 0x0, 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 21:47:30 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002080000006c000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:30 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000240)=@buf={0x40, &(0x7f0000000180)="68f4e3b6988f28d5cadda0a50edb9b1b29f6a8da94a8f95e0aa02b9256edac7a17ab1e1fc246d567f6464d7693833a1d9341313bd980b0fca81604e0a274368c"}) 21:47:30 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000480)=@filter={'filter\x00', 0xe, 0x4, 0x2b0, 0xffffffff, 0xb8, 0x1b4, 0x1b4, 0xffffffff, 0xffffffff, 0x290, 0x290, 0x290, 0xffffffff, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x94}, @REJECT={0x24}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'ip6erspan0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0xb8}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x94}, {0x24}}}}, 0x30c) 21:47:30 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f00000020c0)='ns/ipc\x00') 21:47:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002ffff070000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:31 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f0000000040)="bb", 0x1) 21:47:31 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000074000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:31 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x5}]}) 21:47:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000080)=@raw={'raw\x00', 0x9, 0x3, 0x2a4, 0x158, 0xffffffff, 0xffffffff, 0x158, 0xffffffff, 0x210, 0xffffffff, 0xffffffff, 0x210, 0xffffffff, 0x3, 0x0, {[{{@ip={@remote, @remote, 0x0, 0x0, 'team_slave_1\x00', 'netdevsim0\x00'}, 0x0, 0xf8, 0x158, 0x0, {}, [@inet=@rpfilter={{0x24}}, @common=@unspec=@physdev={{0x64}, {'vxcan1\x00', {}, 'tunl0\x00', {}, 0x0, 0x14}}]}, @common=@SET={0x60}}, {{@ip={@multicast1, @remote, 0x0, 0x0, 'veth0_to_bridge\x00', 'ip6erspan0\x00'}, 0x0, 0x70, 0xb8}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x94}, {0x24}}}}, 0x300) 21:47:31 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000680)) 21:47:31 executing program 0: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@isofs={0x14}, &(0x7f00000001c0), 0x1000) 21:47:31 executing program 2: syz_genetlink_get_family_id$ipvs(&(0x7f0000000440), 0xffffffffffffffff) 21:47:31 executing program 3: r0 = openat$full(0xffffff9c, &(0x7f0000000c00), 0x0, 0x0) getdents(r0, 0x0, 0x0) 21:47:31 executing program 5: setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0xea60}}, &(0x7f0000000040)) 21:47:31 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002080000007a000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:31 executing program 3: add_key$user(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)="1e", 0x1, 0xfffffffffffffffc) 21:47:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020000100000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) accept4(r0, 0x0, 0x0, 0x0) 21:47:31 executing program 0: openat$dir(0xffffff9c, &(0x7f0000000000)='.\x00', 0x41aa02, 0x0) 21:47:31 executing program 5: mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) 21:47:31 executing program 3: clock_gettime(0x0, &(0x7f0000000380)) fork() sched_rr_get_interval(0x0, &(0x7f0000000000)) 21:47:31 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000385000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:31 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000387000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:31 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}}, 0x1d) 21:47:31 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00000001c0)={0x6, {{0xa, 0x0, 0x0, @mcast1}}}, 0x84) 21:47:31 executing program 0: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000003c0)='./file0\x00', 0x0) fchownat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 21:47:31 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000022c0)={0x2, &(0x7f0000000000)=[{0x80}, {0x6}]}) 21:47:32 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x44900) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x0) 21:47:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020000360000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:32 executing program 0: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) openat$dir(0xffffff9c, &(0x7f0000000080)='./file0\x00', 0x80402, 0x0) 21:47:32 executing program 5: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) accept4(r0, 0x0, 0x0, 0x80800) openat$fuse(0xffffff9c, &(0x7f0000000480), 0x2, 0x0) 21:47:32 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000388000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:32 executing program 3: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000040)=""/183, 0xb7) getdents(r0, 0x0, 0x0) 21:47:32 executing program 2: openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x836841, 0x0) 21:47:32 executing program 3: mlock2(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x1) mremap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000ff5000/0x4000)=nil) 21:47:32 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000389000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:32 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000040)={0x2, &(0x7f0000000080)=[{0x1}, {0x6}]}) 21:47:32 executing program 5: r0 = fork() tgkill(r0, r0, 0x7) 21:47:32 executing program 3: unlinkat(0xffffffffffffff9c, 0x0, 0xe8ef6b9ed069d131) 21:47:32 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000180)={0x0, 0xfe, '\x00', [@generic={0x0, 0x7ef, "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"}]}, 0x800) 21:47:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000280ffffff00000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:32 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_flowlabel\x00') read$FUSE(r0, 0x0, 0x0) 21:47:32 executing program 2: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000002680)={0x0, @tipc, @phonet, @generic={0x0, "01c20c8047fcee32f6abbd539cc2"}}) 21:47:32 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x82081) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c08, 0x0) 21:47:32 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0x4a) 21:47:32 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002080000038a000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:32 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0xa, 0x0, &(0x7f0000000000)) 21:47:32 executing program 3: openat$dir(0xffffff9c, &(0x7f0000000040)='./file0\x00', 0x141a41, 0x0) openat$dir(0xffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 21:47:32 executing program 5: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000003c0)='./file0\x00', 0x0) statx(r0, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0, &(0x7f00000000c0)) 21:47:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, 0x0, 0x0) 21:47:32 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002080000038b000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:33 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x64, &(0x7f0000000000)=[{}, {}, {}]}) 21:47:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002080000000000000100000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:33 executing program 3: openat$dir(0xffffff9c, &(0x7f0000000000)='.\x00', 0x90000, 0x0) 21:47:33 executing program 5: mlock2(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) 21:47:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 21:47:33 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000180)=@filter={'filter\x00', 0xe, 0x4, 0x34c, 0xffffffff, 0x0, 0x0, 0x1f8, 0xffffffff, 0xffffffff, 0x2b8, 0x2b8, 0x2b8, 0xffffffff, 0x4, 0x0, {[{{@ip={@multicast1, @local, 0x0, 0x0, 'batadv0\x00', 'ip6tnl0\x00', {}, {}, 0x1}, 0x0, 0x94, 0xb8, 0x0, {}, [@common=@icmp={{0x24}, {0x0, "3cbc"}}]}, @REJECT={0x24, 'REJECT\x00', 0x0, {0x7}}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'veth0_to_bond\x00', 'vlan0\x00'}, 0x0, 0xd4, 0x140, 0x0, {}, [@common=@set={{0x40}}, @common=@inet=@dscp={{0x24}}]}, @common=@unspec=@NFLOG={0x6c, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "b84cfaac59e06675d3d2e517840b7e1791e05c0c31013c79da8f72895fd7e5482ab53dfd13eec280b20b6929633aeec540e907527b1040f612be45b89e6b289c"}}}, {{@uncond, 0x0, 0x9c, 0xc0, 0x0, {}, [@common=@addrtype={{0x2c}}]}, @REJECT={0x24}}], {{'\x00', 0x0, 0x70, 0x94}, {0x24}}}}, 0x3a8) 21:47:33 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002080000038c000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:33 executing program 5: clock_adjtime(0x0, &(0x7f0000000540)={0x80}) 21:47:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000080)={&(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c, 0x0}, 0x0) 21:47:33 executing program 3: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat$null(r0, &(0x7f0000000080)='./file0\x00', 0x0, 0x103) 21:47:33 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x891c, &(0x7f0000000040)={'lo\x00', @ifru_settings={0x0, 0x0, @fr_pvc=0x0}}) 21:47:33 executing program 5: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000040)='.\x00', r0, &(0x7f0000000080)='./file0\x00') 21:47:33 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208ffffff8c000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020802000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:33 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netlink\x00') read$FUSE(r0, &(0x7f0000009400)={0x2020}, 0x2020) 21:47:33 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000000c0)={'syzkaller1\x00', @random}) 21:47:33 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000200)={&(0x7f0000000040)={0xa, 0x4e24, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f00000001c0)=[@flowinfo={{0x10, 0x29, 0xb, 0x7}}], 0x10}, 0x0) 21:47:33 executing program 5: add_key$user(&(0x7f0000001740), 0x0, 0x0, 0xffffffffffffff4f, 0x0) 21:47:33 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002080000038d000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:33 executing program 0: setrlimit(0xef273df025188eb, &(0x7f0000000000)) 21:47:33 executing program 2: modify_ldt$write(0x1, &(0x7f0000000200), 0x10) modify_ldt$write(0xffffc90000000000, 0x0, 0x100000000000000) 21:47:33 executing program 5: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000003c0)='./file0\x00', 0x0) name_to_handle_at(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[], &(0x7f00000001c0), 0x0) 21:47:33 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='net/ip_mr_cache\x00') 21:47:33 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208ffffff97000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:34 executing program 0: r0 = fork() tgkill(r0, r0, 0xa) tgkill(r0, r0, 0xc) 21:47:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020803000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:34 executing program 2: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x80, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='net/ip_tables_names\x00') preadv(r0, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}], 0x1, 0x0, 0x0) 21:47:34 executing program 5: r0 = openat$full(0xffffff9c, &(0x7f0000000c00), 0x0, 0x0) mmap$perf(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x4, 0x12, r0, 0x0) 21:47:34 executing program 3: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0, 0x1400) 21:47:34 executing program 0: add_key$user(&(0x7f0000000080), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="d2", 0x1, 0xffffffffffffffff) 21:47:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208000003a8000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:34 executing program 3: r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x100800, 0x0) 21:47:34 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_vs\x00') read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 21:47:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208000027b0000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:34 executing program 2: futex(&(0x7f0000000980), 0x5, 0x0, 0x0, 0x0, 0x0) 21:47:34 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1260, 0x544000) 21:47:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1269, 0x0) 21:47:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020804000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:34 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time_for_children\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 21:47:34 executing program 3: process_vm_readv(0x0, &(0x7f00000024c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0, 0x0, 0x0) 21:47:34 executing program 2: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PTP_PIN_SETFUNC(r0, 0x40603d07, &(0x7f0000000180)) 21:47:34 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001740)="3771ac33c4c1e4811f1386be53913433c19c24083344d6d4db67a1166f646a1f04df2a9adc0456bc9eb208f7e9747fe2bb", 0x31) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)='\b', 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="7e56e80ac764d12b0611d5938133357d848fab761fb71b901dc92b1da51c9c23fe5305ede8b40a4c85d1a532a07314ec0a6b675d0cc2d92cc2cfc35e", 0x3c) r2 = dup(r1) r3 = open(&(0x7f0000000280)='./file1\x00', 0x10f0c2, 0x101) sendmsg$alg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000000c0)="7b33bedc9b0b9acbe201faf578dd5ac5b1aa06ce67f543f2a47d272e", 0x1c}, {&(0x7f0000000380)="4f03b6d768eab7ed91f0ec14a300b758cb8ece8128910ed9806f5e0ecbbdac5c83b1b7c5d8c5e55cc778c51b772cae9b4c85e89631c0ec86a64fbe1754f3b46db300edf42a29e8af12ea094088d1f40f857c344e76353a832a5dc66b470c0798034c24b88d59339a2a95f9847c556523bde6029d50ec488d8fe695b9614e968b8351d239011f9bf58b31d845546372cef1dde90a7d20f8ad136b57323717f1aac8b2ed789fbfcccac72dbfa0a5f1ba29fdb93965abd2f5e3f77f0d3da5b2433053ae33d2e9be01e19266075747b84adadf99d27adf3a4813f8f67c36d6343d855dfb13a91cd4bb88eaf0c254e718d76197dfcf37f084c3b922927747708703e2e08ce85ae64fa32ce9451284eb101aa3fdb11af94111f2972f92e9f77360d0bf6abd67e8831472b7af2ec97cea8b79fd3dc7c40b4ca20b4b019ea3f6bf9cc6297d8f5d003b4cc216f695f4db228b746aa6077232ea3d836a4cb8b09bd00685ce48841afaab3c09cc10e8c7675e5e5f9a8f6254661c3cba83eb48256c6ec431e44a5c2c91263a60421c298438a0ff26951549446cee4a609af5b4bfcca255cd7214eab7ef39c9e758e6de565d82e6a9f8b9af019e780dfc5979ef8de197a7c12422dade49d12201969987424bfbb837f43b3e92040526ea90f4cd2c6e25f9c7832b06b747abf31bf6d4ef0c07d6f4394f12f5a6efb347be42b3fa6d0249b7f1d1a15d8eff8d36ea74d4587810bc996dc304f8bbfd962320182430705c658ea30867017ea676318273aeee10510e5021965520a9c2533489a866a91e578b1e7096797085a0a6573dd72d0398996e9df78cdb27962c673190b4bb74bd22de8970c36d5cdeda1ca12a155a39cc539c885e515c1705438bb915893b6ff793240abbe24c46272d2b029882fcb1649c991c5f7e6a32f25e5213c10792da41d92b556dda95033d6e96d6fa7384fff4479d976553ee49392e24744c11b6ad499e698a7ead45de678ff8aca826ee72740a37fdca7e0a25772f361aaf907c2e41a4999143ba450d779323a11c75c2cc1281d197c7b86015103567a3a12f612b22431fc89e0201ff6d46af7f118570729a12f403e1ee8bdbc239d28319e1f4e1951ec2ffc9c07137cba5bb9705b27f2c87b815b06883a23a7b5de1bf457b6a2a25e6854cd67e9268cac5960ebc739829fd056f6380087549a875256a11606aa54a0920727fd718c3817c7b0a5d79facdf8a833f92c6e75885620eb0f385aa8443040b36c47c90fc4008857fe71c5b805ebe11f9e08f8aa115174d0374d9a209fa724386046dc0dc7322eab1429b79d86b66364a0bf13e1073528ac1a41472c359bc44d2366aed80943e56b2d415dfa7d14a7fdc9250e10994484cbb22f936f13dee3ce68e214da37b69e69965ccbba0167e2a3bf2659038a7a66de843b12298198b5d69f0adca318044afe4efc880db888a52ac9c158b1029ee554abd98a75fe5432bab52704c86925945cd319b269372d91d7f9f305ff043cd0cba528f980ac9aadb2dd3394895a812751fdb5196a7732fcdbbf9be87339587d0c54516f6d052b46bd60342266044836ab0fdfe5b8e3b607a38d3683d0d4c117a09b2382a96b2a5e37d702936ff42fcd526d83e749b9953f91d4039deab88653bde0a6d76ed65c77008f3581682fb2f8cb0d0e7b9eb93916c12fec2204a4f3995f3bc9e52b5aa995ecd5642d70c0e252c9d62f9c80f888374cac74c2c5dd4cce9e81b77cccf11139b2b8ab715437c7708764352b45d4af78002ee64c46cd9609b12b9eefa6fbdb9338109abb5d41f9113dd9f8c0111ec9364c3bf3f825dd4629bf4b60b2355657f12fa977063619929692fcd2c7fde9088b2f8433322940985bae0c6396e1aadbc7221bb4391377975f72e81beac6932d6c447a9593a99990e8cbf22c17448dba51c479c19de7e17f07fd1edac1e208181f4a9e4fc0fe293e1bb9c5f1d3c74e0178066c4ea8ba9c797cafa64ea3ae31233f0f9f5aa5cdea52118c97e8ed126e9f1a8c67539606b57e1c6179533f016bdcccda8098aaca10a5d762dc6e7821e9c35a88400705e686216ea4bdb5c3b22403dc8f1843d9b6c6e0ce610231d7e0b1393ca494768486c666a3cd0f466f82b8d230d8bab05682a5ac98a8d5fe55cbedf9e8d8470bf41379fc411edbe23b755c5f3f33f8237bc39369a52b7e2024f5ace31659b2e9cb0268c2b15600a85a304afe54bb55b787a07b9e5d49c19042dadcccd6f411990e6adfde02f20bd81e98488d7f874874b7c48ddd76e4adfa456c5f48040b4e5639abaee48e36c77a39d0cc33e51b86d273a085c6d4b2d6a850bf373ad2d571a2172a23bd9aeed2785a0bf5dfd872fa724dacf66d4522d7a0cf5049ded51d4233e3004e12a30e41b15364446a7bd9284fc7cf5e338b71b2e9c1452cb2992d0fa3feaf134651e641c2265bd7f066e8bec3d8d9a79ec10ac8405f2fdc833ab392abb2cee593323ce5e97a9075f1ca11a731613d0c19238473e7b446df2fd2c00d3c1985349e77a6b7509c0f0403ba18c4690f9906135c7ce7c00e951ef24b149725933ca5e5337c5a1aa11d7de330c3ce75afa84e3761320e7d754c4184b10d67c60bbf68ec25c17eedd5168a54cd04db5ee0dc00e98f2e90fa7e1973dbc58f2104d2f8bd9f1a4fdc6d0b6335959540fe477c16f2d7a4da967ab09028be638e928d098c321c59d0859da639c8c36a5709a4cb57c27e6ca652695a05e7bc01f4273485c44456df2d3ec267627eb5234fb3d6dd7d9036dd953a59f5e11f962ff49bc537a84f6630a94b74ccc95d4cfc387ccfa127ed2e0017d7158a745d50f7d336677e7453244d68596cee90521c92d90e37799d20f61fca25d3fbe8308f7e31653d3716bb297b9dd8b3e82023ab095358b807292b0b0053142f7285d25f8cfb1fca4f96ba75b71a32ab723298fa81645871dc5a1d744735ad32fb5256ba87c43a52fc750ff20570797eff2d1e715c6cbdbd49b16b0094fac0d4b9c20f722c140fd07159d842076a10cb70db78b20fbdb39dc7656163ca986f0062b8474cee482aca49e5d9a42ea482f1aafa8f7d7ab846192d842b8f661a60c77882069fb77cf0170eab36c570787e7101a39266434a68def813a1ba3b8c27832ec6aa82c072a6ec828b621f6da50f7329c21405b1b5c70e66bc6f231907529b34040430226edb94f9c4e5871dd29032217f5436c3f245841375e19846250928bc376e283ad40df137c7afc305617b78384052ab69a6812c0d9549469a2e8799f815d3bcd919f757671a707df242163a8b4a7638474bbff8a4f7347c7f805a91da4fb5d2ae13100b3fc2ed50b02c1f27c3704421cb2ff59b8f098f337679582dc5de5cf1326aa9d6437d4fe2a74b4b5ce3bec6ca8af17d1f69776c35bfee2a1f608ecdc4c7a6e347d96d4a94df25b3101ee09b7710bcbdd972981c3ad73c21f83dec7f408ae17f51d995715051e50836de03d6d3a493dad0f40f95c5f40073fd8a757f57f6644e3bd7b6b2bc0a17fa33e7645b3fc3bfb92203746306f9031fc003518177934342d09b98d9c8f39ea5f8d5fcc76f872b12a7ecbc43522d703cea37083b552aea26ca4958ccc1c684e7708a3aec9278edabea6fc8fd8d583fba715a57d681a0046cb8d55cfb7af0e5a254635662cff555e8987e54497094c958a0afe99a6d0c7eb23d6df71b82e4d9ec48212d6c47acbc4b89a85fb90c1ad5ff1b0ff400c253306d2cb14b320ad04f2c414ee88a65458b23b0006e895036bb7bbee2b61d52c5aabbcdb623ec244ff19a9d51f9894f282017bfa1f6e191ca8c57ae63749a233b4a0eba4f828a21ab50bb21255c5edcad489ec8034496054b11b9c2f9ee7503e8b4634c29cd529c2f05cce3d803288e15a90216a0391a7c557a185deb2eb04987ed890307dc1991ab7cf4caba92cefb30d95d7055c6283fe354651d7adc9b7fec774321532282b3caace23d8dc96f7fa093c91fddeb13074ded08153635bdad041fd92d75d1e76b3368b2e4346e5d87376713d275448015814281d7586886843ed0eae25d64db674325fc791f04205e5f5102c6b34e9061a7ee02a9809056a61cb9ae82505823be6d964e375b62a06968d45d7ac1fb92cc3858e9245721a5637e3ce28acb71ec7b934cf6070858ef649d84a360c4ea9f6ca4a98275ec06cc3762382b57828e4692beeab41b1fa796665230e59ec3deb5019b037e8000814d9046561ee14653273d51966e9d81bfb800f465d3ccc39602118b5a242d72a6c8ef34f9f1db83ebcef9a1088b363d87a6c10645c7fc9b2416f0cecd7431b63ad359dcaf2b3606c6167a24ec8a432051b03f12c7483731e8e776b43eaa6cb30c2166e4efcea0d690a71d1f4821ef7a9275806dbe41dda2d8d8e06e5328b636b5e6f0cb7a38ae6a4e0d74b3263a57d31fd80daf5177d69fa0b609d8800f33825b5a4a48861b4b1e801056e68e5e8ce36d22ce93c8a31d4a4ee67bfd2808a88f32e4416ed58c32d7bd7582b2dbac4c7abaf19ab967d561df15e28145ebeca6f0a3c6fbe24fc21057df6d844691f2a3a2594e78f4aec1d3b63b9b6167bd05c4101f69e996c05d97eaf6e98650c745cd688be7931b69061f50cfa45df9cc5451539e117eabb03389f0b0ba510325f77526fcf6f0104cb992d1657c9886f9b7eeabd8aae10b15ff167f2646c14189ee998e141680a17b782f7a9dcc618bddae8431965598f3761372058385177b80228270db9b370fe6056fd9f00cfc9737a50c1e2adbfc6ef7c149babc6a835d631de34805b116ca28ea8d74938df0c81944b5346f9ec585f372caf9215380b6babd9dfdf2dafade12a5f93731875d44eea495c2a11b26ed6df519ee32b919e4b00c3c17ecba1ca981a7017757d2f7c434b204b5003f2f6aa44a32c5bb7d26a641640caa1001254ce516765fe7411472483a7234f8ff6b31a230122cd9f909f7b5f56127b088d2bef43a1f927cc322de39eb9dee0dee66d0fef4d2903c4b37aaefd35da94303af024e10f7748f1d5ffb859ae47cf23458293ba33b2118f73b823b15d696413efd12f0b3c3f53427e1c5bf09ef1adba55dd6c05cbe83a1da1df8fa7b2f43ea9649fec743d708079510729fad942939cacf3001c1895aa7e9ae05236ee393c4ebe14235f45d6ed0ac3850d195d41d1c5e8ec6f65ff1538b0db1dd535c6506e4afb18ccd2aa4b3e19808bf602770aa1e58bee9adb27b89de4fa6a665de1e27372288e52f4b98f2c713286c0d6642f2fedd8596e12f125084cc861efe8b86248e0eef80e27be9d37bc455a6b675e767045b4aac683134f66f3e28a3d0d51ee056c79333d5bf7b601255f631ff5e84930bf2f6a74b2712dd08fe76fd8a866657e0a7a8cda55fd3e773bd91229695c400703ee6ffc55e68d7e21364f0ed293d3dcb6a2806eb0f5a76bc795ff888ff26f6002bd5bd6f879dbadebb78a80b8c727a026fc0c6dde0ad8e27ffd4e94d4bcfce556842fa31513388c35998366a15d4901f2ada1ce99393eed74070a8bd1119bb3ea6f7f7424c7383b492edc23f6b23e9349c00093e26da8e1fed998f8cd88efb5b7da328a03f302838f91488e1e3984b455568a5ee1c8c6b96dbe7de4b71fc4903349080a77905545d4a708b8af0af48a315a8ae816ea4a5dd75959f62b3c0f5c35394e2f3ad740b26fc7b10645472d941fe3a5c516268667dcd8216486597bffb7db50029efaeae192b3aa63e3c76714e289b784f4d9e69b0ffc3aab08f3c679710124c18d8248e", 0x1000}, {&(0x7f00000001c0)="d387a240d502968bcb153bbe5019f685ac2b605d363c369ccb37fd3b346fc67114edea26d67fd2eac9f88f1a1a7d0199b294a87b8069683fbebbaf71eada5fa9c4bdaaf512d2046b900b29c6c3a522541ed14e91c6c5785316bf24b5ace612c3abbe94a8", 0x64}, {&(0x7f0000000240)="b8e7aa0541a8ab9658adcc2e86ff8e9173c066fca97c693de6930bbb1b7992a57b6a6b774837be496bb436760dd116158669677877335545e10a4c2f", 0x3c}, {&(0x7f00000002c0)="e476c57504e7d601959a42215f0ecba632db9f0e72c230b38f52e8fcc7baa4a475e0610d986055a32fbbdb37d4fe913100e7e70fcd", 0x35}, {&(0x7f0000001380)="2473e7f4668dcee28463e54bc1e175c14198470d812e744fd3bf7ca7619d2336361dc23636b3ca758691f5c701aba053ba3f1a486e0944304c42f3fc49312d8e419a56824941b4fdcf6a728ab35e4d8a66f77173727e32c9767a35f10a6c2319f3fe2438fb005c281136e51e8e97e4a76b82405981ab6550b80430ef7301a8d60a1342470e8b5d31ed7f3f25199b7125450b4babe48aa887cffa286f48c02063243f633a3ea8886e4f5850a0138bd17b3d2633deda", 0xb5}, {&(0x7f0000001440)="d4a0adbc9fff0b91567fd5c90b072cfbf1316ffdfa664e74c5ed9e1c65ea44672cdbb811e8889c69ee58d9ad44484268a63b19c5e800e21e4c1fdec08bc31622479d80a13dc1994fb8b89dbfd02044e69aa5d6049b3982239c02bf59f1af900272050a5e50163ec031cd2238bdc9d289f78240eb4c077a99cbd58076f62b771e096885a23c0cd29ccecaa36eba484b426aa9945565afaffa1058e2bc19093c32b3d0936139617879c40d36ade9e4cc5b64eec9828f741c22dc9eaeb47462976c3a5e4ebd421cfc7d0c3e09e39a56adfbdc84196cadc41b9f5cb63fa3a545c893ce", 0xe1}], 0x7, &(0x7f00000015c0)=[@iv={0x20, 0x117, 0x2, 0xa, "38975af935d1bb097b71"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @op={0x18}], 0x68}, 0x20000000) ftruncate(r3, 0x200004) accept$alg(r3, 0x0, 0x0) sendfile(r2, r3, 0x0, 0x80001d00c0d1) r4 = openat$full(0xffffffffffffff9c, &(0x7f00000017c0), 0x100, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000001800)="2a52b86241ad65d36ef84d4949e8ebc195981c5542af23ba110b1ab7dc5e33a01ae1952b1fb3aa52409ed4e5673fd81dfd30264f69e370b6bd268678edde87fa3ecf81639dda535c39b23988", 0x4c) read$alg(r1, &(0x7f0000001640)=""/229, 0xe5) setsockopt(r2, 0x1, 0x20, &(0x7f0000000340)="1e09f44a", 0x4) 21:47:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208000026b6000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:34 executing program 3: clock_adjtime(0x0, &(0x7f0000000240)={0x39, 0x0, 0x0, 0x0, 0x0, 0x7}) 21:47:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, 0x12, r0, 0x0) 21:47:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x4c07, 0x0) 21:47:35 executing program 0: memfd_create(&(0x7f0000000200)='\x04X`_A\xfc\x9b\xb9\xe0\x81]S*\x0f/\x88:.\xb0P\xb4\x17\xc6?\x13L(\xa4\xcb^\x84\x94G\xcbM\xde\xab\x10\x115\xd3\x11\xc8\x84J\x8c>|\rJ\xb5OJ\x9e\x80\x93\x1f\xf3\xd4\xf9\xa6;\xde\xc0\x92\x9dJ(\xfabF^sh]\x8c-@\xefa\xbe>\xfbXI\xb8\xd7\t\xbf h-3J[\xb8R-B\xedL7\xd5\x18O\xb1\xf7\xdf\xdb\tr\xd9.\x92\xa3@\xb1\x00\x00\x00\x00-\xb8D\xca1%\x96\xec\x0ev)\xa5x\x12\xa4\xda\xe0\xc3}\x86\xebp\v\xbah\xbc', 0x0) 21:47:35 executing program 5: r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) write$P9_RWRITE(r1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0xc082) r3 = memfd_create(&(0x7f0000000140)='\xbb\x02\xb1\xed\x97\xdb\xb1,\x116\xe0\x89]\xad\x01\xc3r%;\x99\xbck\xe7=\xfa\xe8HB\x00\x9e\x15\x9e\xc9\x86\x8e\x1d\xdf\x9d+,\x00\xd7h\xa4\x06jt\xea\xf9l\x00\x00\x00\x00!\xf8\xac\xdc\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000180)=[{&(0x7f0000000300)}, {&(0x7f00000003c0)="0614f48e2c3e4aa6d2b1", 0xa}, {&(0x7f0000000840)="322e77f9f2f14b5a224a094c6772558a7f061a9a1d6771f2aeb3e5ea62010400000000000005c393cb2c6aabf7f9426957c9f063ea6c22f2a006bfba12d39bc3643524b7c220c5af6f9b7ebad739041c531a6785d4dd3a082ef1d1bf668959bf", 0x60}], 0x3, 0x40ee1, 0x0) write(r2, &(0x7f0000000000), 0x52698b21) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x5, 0xfffffffffffff001, 0x41}) 21:47:35 executing program 3: prctl$PR_MCE_KILL(0x18, 0x0, 0x0) [ 762.855446] __ntfs_error: 140 callbacks suppressed [ 762.855458] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 762.879872] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 762.898250] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 762.968983] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 762.977703] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 762.990168] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 21:47:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002083bba5cb9000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:35 executing program 5: futex(&(0x7f0000000980), 0x5, 0x0, 0x0, &(0x7f0000000a00), 0x0) 21:47:35 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x80081270, 0x544000) 21:47:35 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) write$P9_RWRITE(r0, &(0x7f0000000280)={0xb}, 0xb) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0xc082) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3fbcbab16c80fab, 0x11, 0xffffffffffffffff, 0x0) write(r1, &(0x7f0000000000), 0x52698b21) 21:47:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020805000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) 21:47:35 executing program 3: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x0, 0xc082) r2 = memfd_create(0x0, 0x0) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000300)="67b96e81006ff02133a0b3c25ba9cafa32dce59a6802deb952e8231b861180040b2d7a86997f209d3ecfa936ab5e75b3910b192ef18cbdf9fb49", 0x3a}, {&(0x7f00000003c0)}, {&(0x7f0000000840)="322e77f9f2f14b5a224a094c6772558a7f061a9a1d6771f2aeb3e5ea62010400000000000005c393cb2c6aabf7f9426957c9f063ea6c22f2a006bfba12d39bc3643524b7c220c5af6f9b7ebad739041c531a6785d4dd3a082ef1d1bf668959bf5e8231ffd7954c778dd901a3f69d3dda4e98c4", 0x73}, {0x0}], 0x4, 0x40ee1, 0x0) read(0xffffffffffffffff, &(0x7f0000001fc0), 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3fbcbab16c80fab, 0x11, r1, 0x0) write(r1, &(0x7f0000000000), 0x52698b21) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000002c0)={0x5, 0xfffffffffffff001, 0x41}) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) [ 763.107549] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 763.139781] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:47:35 executing program 2: r0 = epoll_create1(0x0) pipe2$9p(&(0x7f0000003540)={0xffffffffffffffff}, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) 21:47:35 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x401070ca, 0x0) 21:47:35 executing program 0: pselect6(0x40, &(0x7f0000000040), &(0x7f0000000080), 0x0, &(0x7f0000000140), 0x0) [ 763.200156] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:47:35 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x8080) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid_for_children\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 21:47:35 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth0_to_bond\x00'}) [ 763.294930] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:47:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002080000edc0000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:35 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000040)=0x10) 21:47:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x40081271, 0x544000) 21:47:35 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1261, 0x0) 21:47:36 executing program 0: sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x0, 0x0, 0x2}, 0x0) 21:47:36 executing program 5: syz_open_dev$loop(&(0x7f0000000100), 0xffffffffffffffff, 0x0) 21:47:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x125d, 0x401000) 21:47:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208fffffff5000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020806000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:36 executing program 2: pselect6(0x40, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000180), &(0x7f0000000200)={&(0x7f00000001c0), 0x18}) 21:47:36 executing program 5: openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x1918c0, 0x0) 21:47:36 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, &(0x7f0000000000)) signalfd4(0xffffffffffffffff, &(0x7f00000012c0), 0x8, 0x0) clock_gettime(0x0, &(0x7f00000002c0)) 21:47:36 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0xc0481273, 0x544000) 21:47:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) fadvise64(r0, 0x0, 0x0, 0x1) 21:47:36 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1268, 0x0) 21:47:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208fffffff6000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:36 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$LOOP_SET_DIRECT_IO(r0, 0x5452, 0xfffffffffffffff8) 21:47:36 executing program 0: syz_open_dev$loop(&(0x7f0000000100), 0xffffffffffffffff, 0x40) 21:47:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x1260, 0x970000) 21:47:36 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x8080) ioctl$LOOP_SET_DIRECT_IO(r0, 0x40081271, 0x544000) 21:47:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x125e, 0x7fffffffefff) 21:47:36 executing program 5: syz_open_dev$loop(&(0x7f0000000000), 0x98e1800000000000, 0x241) 21:47:36 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x80081272, 0x0) 21:47:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208fffffffb000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg$NL80211_CMD_TDLS_OPER(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 21:47:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020807000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:36 executing program 2: futex(&(0x7f0000000000), 0x8c, 0x0, 0x0, 0x0, 0x0) 21:47:36 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_KEY(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="04"], 0x28}}, 0x0) recvmsg(r0, &(0x7f0000002200)={0x0, 0x0, 0x0}, 0x10002) 21:47:36 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8915, 0x0) 21:47:36 executing program 5: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$ptp(r0, 0x0, 0x0) 21:47:36 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 21:47:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208fffffdfc000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r0, &(0x7f0000000000)="b7c65b6a1d656a2684766fe46976da4a8566f5f4337d7476db8f220ab1924a15e6d557f338faf730e5a61426a2b3e4f4d4d51fdaa87589a823b10d1a56ca6e083c3092ebd7e53ac634db0bf945b08eaba1c59e8cdb7934b041d1870d8df0616e1be2aec3f1629b6bf99f4507b2ab87d78c0acbfbbeb8faf6b7d7eba8c160d5f9f6d64e94912d8f6db55c9040f8bc8a35853902290f6706bb34dc9912595816ebc1066b1debb99fa14c6170d6d062cbc2e147372821e06e0451c065c4ed7201bec8c9bf4640eac6d1fbcd6ac4166f23ebcf28727888dc68f1235d7da7db79f9a71499dcc8a1c45690dbba97943c84981b", 0xf0, 0x4, &(0x7f0000000140)=@in={0x10, 0x2}, 0x10) 21:47:37 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000000b00)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0}, 0x0) 21:47:37 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='comm\x00') write$binfmt_script(r0, &(0x7f0000000240)=ANY=[], 0xb4) 21:47:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0x2, 0x0) 21:47:37 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)={0x13, 0x32, 0x441303dc9f489971, 0x0, 0x0, "", [@nested={0x7, 0x0, 0x0, 0x1, [@generic="5c833f"]}]}, 0x18}], 0x1}, 0x0) 21:47:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020808000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:37 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5411, 0x0) 21:47:37 executing program 5: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000300)=""/149) clone(0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) 21:47:37 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208fffffdfd000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:37 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000100)) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, &(0x7f00000000c0)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x28080, 0x0) ioctl$KDDELIO(r2, 0x4b35, 0x3) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000003740), 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000003740), 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PIO_CMAP(r5, 0x4b71, &(0x7f0000000140)={0x3957, 0x0, 0x10001, 0xd6a, 0xd, 0x1000}) ioctl$TCSETS(r4, 0x5402, &(0x7f0000000080)={0x400, 0xfffffffe, 0x100, 0x1, 0x5, "7ab9197ada2ae642d7061b235c7bff8bad08b2"}) dup2(r1, r2) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)=0x4) write$P9_RREADDIR(r2, 0x0, 0x0) r6 = semget(0xffffffffffffffff, 0x8, 0x0) semctl$GETVAL(r6, 0x4, 0xc, 0x0) shmctl$SHM_STAT(r6, 0xd, &(0x7f0000000180)=""/17) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$VT_RELDISP(r7, 0x5450) 21:47:37 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001b00)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x541b, 0x400000) 21:47:37 executing program 3: readlinkat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/62, 0x3e) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) 21:47:37 executing program 2: r0 = socket$inet(0x2, 0x3, 0x8) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000001c0)="0817262dbd7d26274532570ce573dcaacb6be5a5bd10ac66", 0x18) 21:47:37 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5411, 0x0) 21:47:37 executing program 3: sync() getitimer(0x0, 0x0) 21:47:37 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0x5452, 0x0) 21:47:37 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208fffffffd000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:37 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020809000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:37 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x8901, &(0x7f0000000340)={@mcast2, @local, @private1}) 21:47:37 executing program 5: execveat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x0, 0x0, 0x1000) 21:47:37 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5411, 0x0) 21:47:37 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208fffffffe000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:37 executing program 3: setrlimit(0x8, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) 21:47:37 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1f) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x5411, 0x0) 21:47:37 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000fff000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:37 executing program 2: r0 = socket(0xa, 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8982, &(0x7f0000000240)={'batadv_slave_1\x00'}) 21:47:37 executing program 3: unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800) 21:47:37 executing program 5: waitid(0x0, 0x0, 0x0, 0xa7bc0923e37c0cf3, 0x0) 21:47:38 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x3d, 0x0, &(0x7f0000001180)) 21:47:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002080e000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:38 executing program 2: setresuid(0x0, 0xee00, 0xee00) setresuid(0xffffffffffffffff, 0xee01, 0xee01) 21:47:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x7, &(0x7f0000000000)=0x1f, 0x4) 21:47:38 executing program 5: recvfrom(0xffffffffffffffff, &(0x7f00000000c0)=""/140, 0xfffffffffffffd38, 0x0, 0x0, 0x0) 21:47:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208001fffff000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:38 executing program 3: clone(0x4300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x4100, 0x0, 0x0, 0x0, 0x0) rt_sigreturn() r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x80000f, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clock_gettime(0x0, 0x0) clock_nanosleep(0x7, 0x0, &(0x7f0000000140), 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setitimer(0x0, &(0x7f0000000000)={{0x0, 0xea60}, {0x0, 0x2710}}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 21:47:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020855aaffff000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:38 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, 0x0, 0x0) 21:47:38 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x45, 0x0, &(0x7f0000001180)) 21:47:38 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000001380)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000001300)=[{&(0x7f0000000140)="635e3674f3ceb8f560973881ca73e60d365d758454529afa65183438255156db75c222f0c4b85231a491acb9f52272521ffeec1c72d3f28ced343aa72aaa3534d09e0d188b13d2cc8d862cab000aa0742c03ca849f9765af0ee88ea6dc564d14209b99eadc8276590ebbeaab3238da670c0ac6347d28ebdf002b948eeb64a43b46565fa26887f36e93a6c19b452873531f6614a6ab1256e6924d0c1877c73a4cc95b93da1b6d713c678af40421385a625583cc0f4b0a5ad9e2b8f9d3515655e55e6bf6e8a1bdd900e5fefd0600ba00b81f1154edc0dd74fbdca48b82231ab4039deca37fed2d2af77cd0a68be6f73c822892253b60820c2321c8f59a512d85285ccf90dd8021327f2976410e7cc8da770ea5483e85e1c3e4ecc485520a7d4c11dbd03f6c011f600af2da64d52541bae4fe66ce625832330420175623320d737ae6dc0c22e9a9d88b4e6a4870c9b9f3cafd86983ad85b2a2b1482f798efd81332cf4ce17229cca2229b4599a8b7bedb1f4760c0d9c5f4576828041b93ac9983bf1df98120cfc35711fc2cce74a3ef991cb470c5ddbced5f8b94dd38e186d9da74eaaf472ebad3c7ee0e08ddfe1e0151e544f658ca44a359dfdb24065d5add229f9253768a71c0c9eb60645d23e4e7d08810b3a86a1506d332c20b5bd3ece8d23b4374c9f7361e4c557969e9560c4615256415fc5f73d317d01d3e93988c9c9c48e2150e0c17e64f9b8a4cb35d2b55041f56192f71ec0bde6c0edf3a10861a6b8f96a75d6207c9ee377f3a838d340af328b0a7351e11ddc5c25956affcd9f9467233593a11192bc05d356c14206c9d8b17b44fccaa687456b6f8b89c1798d47e562934fb8b0991508bc34d03c10cd5e5498f45d135c5c4c7073bd07ebefa0d9951e16a5185911826fbf9d4bd11b51feca2be0a16f3f3c24f444536d4f81fd8246abbc28851f08ebaed12c18839eb274d0677b534e6c61f82d5d79caeba556b167280dee1344cbafd679ac5cf389534452faa5887f4b25da0ca16f4f24887882217de6f5611f2087467d883a7a0fb5f3bf2a1581a740a8c05dfa38681611d4692de81f7f017cce40f7f5b1242b4d0e7fef1ccae255a1771c03154832005b3813a628a4d02d12fc60bc46b0ce53bca87d38ba1eb941d407cc4cbdb0abca6a8e80d90155327224c3bd5429300e195f3167b6e0559949b93264ee2252b07654df1c6e8e7452c4ccc9af3802c39c619df734c8cfc7172806dcd753d4f489f0e3f58e7c119cfb1d25426cfbae19fa6a300b4f298b7b0cca9b7c51c461250f8ef1e2999d27fca2cff9dcc4e9eae8ea69db212a321f153fc61ac1bbace6f095a7812fe591c5358275eb368411e1b70456678308a5dd240b7a629a322266bb6597cd218f462292b7957b7096e9cf6e569963821a5d787a34c12ff5194094411652e7ad6d326a1e886d448d17b13e781859f626f2bd6d5d9c234ba25c4eba3616f9c92f38791454238971ae05c2095b1a604ed84094a1632b717d803f8ced0c6dfd2239dc217ff6ae3ca3c8dd13e35c560c9edbd0e71a611b29af6640cf28026996e318f5e5e841466ac81e2c2d92ed88832ba52101c0117b71958ab07025f674a4d334b03e2345ad47a4a5c04f577d3d6d318328197684feec3b01ae92810909b7f9c462726f1f1c2e6d5782352b32670648daa404e224b749574f38246564ba53f723169cc55eddf06f2fda67e1c72ca664df848e961258eed227a6f7def992e3f7412816cc723c648be509e1cfb29c70f9bbebbb26d3f1e6c19074eb4d2cade896e5c8b609a0ff43da1b93fa6cbcd4a5056c7dd4bdbd5cf4cf4cba752b0963bda0b79e1acb4b60e0eefb78c5eb1739a05d1d82331eacd37ebf4baab731488fa2e8c0f9be7ba6c43a9204c6ad0517767db315f8f646f1adeed57416c75c4b6267e0f7f9c8f6996287e7e06e36804c3db6a5530812a0da96e7d1e4113165c65de3bb3f5b49a6903e9e6e0636f720f45a215d407d6a4cec87715f60e27e0ff347a7ebc26c396ea8f723afe855c7c29f1258f9518b42c80868d550c245a487dba8cbe56539228934f98402f6874af7f1d6585b2bebe663ec86d4dd3683af5c7bb810abf34b962b913f8e214f134501c953c2ef366aa391d94cd7e0edb96b06df319e63868909b117e7cb39770a1585c87aeb025455c4fb0e330a4033382b436e9c3c2f5fcb30a96d6b4ec6c5d38b111def7150aef6d1ec63b4c5c6324eff46356a1597e1e324f32e7228b067f42fbb456afe1b7a6e1b10585314cf6ef26bfd35554f6495689ed3b5672692bcbe3a342f186ca74606d5dddc1c66d4540885d7a61a9c70353cbc0bc40cbcd201bc1ead8323f39ee17c6b2971fd60eb193b3a2c84d5ca560fd673cca9769a89c29689e0b77dda3c25f571ef3763840e6320e38cefd892105ed4711677094404a68f0ec376ad316ca6b99d0b5a1f2c01342b8a9d75db2c99d8f993c40cb22b1a7d6a8fdfd1a45e1b815d9741a8c9c2bdf7aa2f6312e4ad7de58a6907983b386f12eb3afbcadfc49e8b8dac105ded369939d639efedaa3217a8b92559799455656fc23b3d95df13570c58c029ed8b3b51b884f2ed920dd198a2bd978a88c7bcf3ef64317296c37078d8fda928132804320fc3a5b217c2c07fca98e5061061b42e4f1672605eb31236103cfe70b28773aba9b30a1a2fa64793145810eab93a530354209ee7632c232e0db5ba4fb3711ca3b0e54a983b7a1c9482542fb8ff1ec9eebf50f3d1113ccde0de7d9590100d11ba86e81737ca07e2cb5889f1e84e2ae6350504ce45ad8ff41a03cc501d998293148545baa7919b9df40a0a7596fbb382839c7d1b75de6431c4bbfffd7b6b223e1d52d5a7944370747aaf229470c22b83586c6517aab05639caefa22a116021f325e1b246b2d1aae6d6b997f6c1c9cd7e070cbd8f4a25fa2844ac70efa52584e1505473174d06f9a1f29d770c62033a55000f71e009bcc39c351bfbc14f541cb3709a69c405aa2d4c7a39f0d574618a3219b7c84e80b46c18957ac8cbff4643a9ef71adb2be9fbe8e52ef7d983d47885afebcb7927b6ace9d197f781ce6b0eb894259899aa47f450f48212c27e2f01b654c5ef64038b3b5d827b4eab734885e0135ebe4a64335a6956cc493e4bc32dcbb4beeb60083df000ec8a9249668cc92337c1cbb2f6ac5e2ccb015d7d91cffab3ea1b21869be368307f92d7bf7d68204febca01142e5dbde4ab591557697f52db8c7fe0a5371d06975f659e696288f254c76d55c3da9cb1f2abad156ab6e1616b101e9686f882f885473e213a722c2fde8f8948288abd40ee3bc18b9330abfa2ef712026177568884739444630cf1ffad4827f52569d77924e053ca43709be6707ee7c554988a435baf89a97de1c0d9b506bf9a57280986d254deef46d2162655909b1bceb588da3059abbbfa785c872da1373bfa524893c674fd7170295ae6def78a69afc3167ffcdd835ca444b0af45d750004b8680b7425a2c099f0c7a64c7c405c5e5504f657ecb599b304a743a67854fee8c0202a26a31320ca1f5fa31fa587acaba28286e900ca65d0178c8e0c4eef870ca0a52853279a5d4d24f6e55bf3ae0da3f25412a9ef192336f5969506d84fa015422d79b334ce705bded453656a417ba3a1db39cf393e87317434e0a92b464794000113cd7c6e7e57ba92d655817565b008571005c3afbc06249e2cfdb03256c7ca6ae5dcf2f65be8b702ea934340e7870d16e3b16d3da756c5972ba18ce9a0b3182b338b1c6480915997d98ba26d1988ef987ab0b1d1cede9992a643b5ad8cc8f9f2422f95a301b811aab02b8f098563c951f81561734ba85656b251ee79d27aa0a65eb469f7c91b4eb5c53d1e153d4e857cd42419a06b8c99370b502bfdfe0f1ce4c384aadc3331f05c2faea5351c91643afeb740129b3da0c04b3c620f01375021d7863121e68db317a7f348ade5d745645b008adc750481bd44f681df92b3e7380ab80683bd17f328634052c6f5a099212d788bedf306c49b6686e176fc9b0e67bdf67f5f06504e73e01f5aed5eb14246841bb699da763e3ca7c5023186b895d4355acb64f522ae29cbe5b5be4cba399ac45bd35cdce2013628271a28ad2530c8260e7c4e9442c4dbadeca36642003b47a397fefe7827b42c95b28446ef9224b3976e7cca8b01e9593595c4e5c3a44e627a9968e9e9428721a594ae0e6bebf140f4462aae2772a204cdba405adf1c0344ec19ad049fa7275c51259907babfcf2dd9f971f894d8bdfbac6469ddaae9679a87d91f568beac7b8cef9b218f4b1c5ed77560727299dc34f3e2aa508aa0d68b811a56e76fc3ac8be0bf56858a29e3f40e880a34b7665cc27f9c146ee3de7c8ed8ff77da046b1cf36deeba551bfc5d0b347c09baca8026667bb1c1e8e22af2d8550ceb0d52f1ddcdc702f0ee1fa0f667a99bbb603e70f6d23889b731fd5890cb88df473fe9bfab93320a43565d38ed7b35e091a43b8bbb654ab927885cc4f006a876f3cf3700887b584d922fb0a52015f051ff67d5632ca9a721737f9f6e7f934c96b0e28d0bfa01656f5d81bbd9e0f244f7d8fc4c2904561c4f8e5959568f2e5025173c204ed09ddb64aa3e11de74736cff87e2da5e93ef0d7f382b2809a5839ee9bdb40d73e6b643f6211e6a694dba9ca2d7c211e9d9587d45e03478cbe13be02d8d942cf8ff485a11ca477734ab3c76c8bad37823ae09dfb2a1aa597380b1374f2311ed80facd77815bf44fd4adc8c623ac3b0e2371deee57420b1e313f0df7a97e326da58c2a1941d2b1fc572c1050b81e09762e22584dfc8dce4b93f73b17b14982b0868bcb21a1a7b05d3bcb11760848821069f232c83837b2b166ca0052bd9f71d5a7d572ceb8d197520cab6ce5106be3343ce7c67d4efb681bc5c98956abbb9c0f3846f625f8448cea28ccc2e9f84d0035b8ed96bfc1cb414c5f728d37012ca5ca6c3d67d98df1182cac63128e37e900814c9b8b7ba69b0f5f1593eeacecee6f6455a05d4b36c3a7244b55defa86b565642b097a0fa0457d59ae50756332307556395bf3b1c825c7f338dff17f42d76f0c57184b23ff1778393868f9fd119803cdea99741c39421d5655655e51ce6fac5e785fb593bd1f35a2e54e5545581914f9ba9ffece8979d1573a901683571bf1cc4ada7f0dc3925c52d3e3ad2aa79f8ecd22ba0318a38117f82f8805c421e500e90d480a67360f8b8fd9caa410eee34cf65af899dcef62a68a30fb8d8f1459ee2c5d5f21828d52af0f72ff7c5c776af1fb0e50248fa0b3c145e40178d01dbed5120aafc96d3c1b08112c7225110cf90d060a7f80dc2942e47af354a2303737c0e14b20a10317287a39daa76ec9a5673086d2882001164edc1cb20c898206210109c8f4d90ed64cb4802a833fac53c3d290fe487fbeb56216a4dfa175ab6943705e2c6eea6d21005739a0946c3b2e7c9f5a90784340217e1d83662f17967ff8bdddf4f4afcd3e2957adabd5f885f3726161daa7f354646b27fbd904470e827c20452ea3abb4dc899ff09feaf71d1a2afdd3131c43afbef29c3976714410ec48e9cb923491d80b0a91fd0f5a75e47a18b27b2c99b5b94eda8a79e0bf54e733d280e4dbc08cc22a5e603ca291c7bd29f16f5f0b4bb6638eac84ee1c69a9fb8ee50f7d262792f6419d0bed5535b997da93ecf86b57ab563c88aeff4d43246e94bd8098d12c21288d877eaf8c6a5debb248a0b2141458d8b6c9", 0x1000}, {&(0x7f0000001140)="5a8889971cf4663b5ee9d04642d476f1117d0a812ffb4962fc19872440c44a9f8be267c89ac2ab9efb5ef5ec2fb6ae6e5fc9c7d89598e1f9e9dcc1690534584d2b8196f566019700445968709a4bdd9d3eea9c58c1e7f458c802be26ddb7fc89b67cdad48afd74e6a8", 0x69}, {&(0x7f00000011c0)="43f0323537ef65031c2892716459c7c4e56976b22a7c2af5b31c80f89f0216b634a8514542faf70d6b0ee748034bf048d2f8d6a430f0d7328ec494924be0", 0x3e}, {&(0x7f0000001200)="abf8cd43ae92e7e9e0d123ac0f5dd9d53035e5e71404a0c1c5ec5b30e9fd34eb25539470ee9a7fdd5926a7b6a6fc83fb2d6d34b837051165096e7ecbc9a3386230b31d6048549c584137a075fd113596e62b65d80145b688dc782c761d561d31e1a45aae3f8901673ab33b4e699899b37ff07f023ef02f923cf556690798", 0x7e}, {&(0x7f00000013c0)="162f197e36000804040bcff6bf2ba1899422d21e0af8d2f96c80476e96ef7f4910635747df2908397035a23a001280bb65e16b1c83356add8d1f776d23990a0d4d417e7097911d696ddb0415aac7e9b74a3ee59219122d951e4f7ff341e545d498abab65f0896fd883d13f4ba432cbf4d10a0406e8943591ab418c33143e", 0xffffffffffffffea}], 0x5}, 0x40) 21:47:38 executing program 0: rt_sigprocmask(0x3, &(0x7f0000000180), 0x0, 0x8) 21:47:38 executing program 3: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)={0x0, 0xea60}) 21:47:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020813000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:38 executing program 0: setresuid(0x0, 0xee00, 0xee00) semctl$SEM_STAT(0x0, 0x0, 0x12, 0x0) 21:47:38 executing program 5: mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) msync(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2) 21:47:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208fcfdffff000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:38 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5411, 0x0) 21:47:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) connect(r0, &(0x7f0000001000)=@tipc=@name, 0x80) 21:47:38 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8981, 0x0) 21:47:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x800, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 21:47:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208fdfdffff000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f00000025c0)) 21:47:38 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 21:47:38 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)="a8", 0x1) 21:47:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020823000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:39 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) fchmodat(r0, &(0x7f0000000140)='./file0\x00', 0x0) 21:47:39 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mknodat$null(r0, &(0x7f0000000200)='./file0\x00', 0x0, 0x103) 21:47:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x800, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 21:47:39 executing program 0: io_submit(0x0, 0x0, &(0x7f00000004c0)) 21:47:39 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002087fffffff000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:39 executing program 0: mknodat$null(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x0, 0x103) 21:47:39 executing program 2: faccessat(0xffffffffffffffff, 0x0, 0x119) 21:47:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x800, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 21:47:39 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 21:47:39 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, 0x0) 21:47:39 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002088cffffff000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020848000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:39 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x800, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 21:47:39 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 21:47:39 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0xc4001, 0x0) write$P9_ROPEN(r0, 0x0, 0x0) 21:47:39 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) futimesat(r0, 0x0, &(0x7f0000000300)={{0x77359400}}) 21:47:39 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020897ffffff000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:39 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) futimesat(r0, &(0x7f0000000280)='./file0\x00', 0x0) 21:47:39 executing program 2: mknodat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) 21:47:39 executing program 0: pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0), &(0x7f0000000100)={0x0, 0x3938700}, &(0x7f0000000180)={0x0}) 21:47:39 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208f5ffffff000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:39 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0) 21:47:39 executing program 3: openat$incfs(0xffffffffffffffff, &(0x7f0000000200)='.pending_reads\x00', 0x0, 0x0) 21:47:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002084c000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:40 executing program 2: keyctl$instantiate(0xc, 0x0, 0x0, 0x0, 0xfffffffffffffff9) 21:47:40 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 21:47:40 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x64001, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) 21:47:40 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208f6ffffff000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:40 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x80001, 0x0) write$cgroup_freezer_state(r0, 0x0, 0x0) 21:47:40 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, 0x0, 0x0) 21:47:40 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 21:47:40 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) 21:47:40 executing program 5: write$P9_RVERSION(0xffffffffffffffff, 0x0, 0x15) 21:47:40 executing program 3: pselect6(0x40, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x8d}, 0x0, 0x0) 21:47:40 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208fbffffff000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 767.995954] __ntfs_error: 146 callbacks suppressed [ 767.995965] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 768.022681] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 768.036880] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 768.125584] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 768.134704] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 768.141304] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 768.153014] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 768.157784] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 768.173939] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 768.265765] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:47:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020868000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:40 executing program 0: linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0, 0x200) 21:47:40 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) 21:47:40 executing program 5: semget(0x2, 0x0, 0x8afb5d1c1dcdb648) 21:47:40 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, 0x0, 0x0) 21:47:40 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208fdffffff000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:40 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) 21:47:40 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x0, 0x0, 0x0) 21:47:40 executing program 3: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWRITE(r0, 0x0, 0x0) 21:47:40 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) io_setup(0x0, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f00000003c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 21:47:40 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r0, 0x0, 0x11, &(0x7f0000000000)="ac", 0x1) 21:47:40 executing program 3: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, 0x0) 21:47:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002086c000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$caif(r0, &(0x7f0000000000)=@dgm, 0x18) 21:47:41 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208feffffff000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:41 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r0, &(0x7f0000002340)=[{{&(0x7f0000000000)=@ieee802154={0x24, @long}, 0x80, 0x0, 0x0, &(0x7f00000010c0)=[@timestamping={{0x14}}], 0xf}}], 0x1, 0x0) 21:47:41 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) 21:47:41 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0xc0189436, &(0x7f0000000280)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, r2}) 21:47:41 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@abs={0x1}, 0x6e, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000100)="d4", 0x1}, {&(0x7f0000000140)='`', 0x1}], 0x3}], 0x1, 0x0) 21:47:41 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r0, &(0x7f0000002340)=[{{&(0x7f0000000000)=@ieee802154={0x24, @long}, 0x80, 0x0, 0x0, &(0x7f00000010c0)=[@timestamping={{0xf}}], 0x18}}], 0x1, 0x0) 21:47:41 executing program 5: syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="c0000000", @ANYRES16=r1, @ANYBLOB="01002cbd7000fcdbdf2503"], 0xc0}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(0xffffffffffffffff, 0x0, 0x0) 21:47:41 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x6, 0x4, 0x7, 0x1, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0xf, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x20) 21:47:41 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800020000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="c0000000", @ANYRES16=r1, @ANYBLOB="01002cbd7000fcdbdf25030000009c000180140002"], 0xc0}}, 0x0) 21:47:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020874000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/220, 0x1a, 0xdc, 0x1}, 0x20) 21:47:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000031c0)={&(0x7f0000003000)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000030c0)=""/196, 0x1a, 0xc4, 0x1}, 0x20) 21:47:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x1, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 21:47:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x7, 0x0, 0x0, 0xfffffffd, 0x0, 0x1}, 0x40) 21:47:41 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000031c0)={&(0x7f0000003000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x8, 0x68000000}]}}, &(0x7f00000030c0)=""/196, 0x26, 0xc4, 0x1}, 0x20) 21:47:41 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8982, &(0x7f0000000700)={0x0, @in={0x2, 0x0, @multicast2}, @tipc=@id, @vsock={0x28, 0x0, 0x0, @host}}) 21:47:41 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x34000, 0x0, &(0x7f0000000100)=@abs={0x1}, 0x6e) 21:47:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb010018000000000000007000000070000000030000000000000000000003000000000300000003"], &(0x7f0000000100)=""/128, 0x8b, 0x80, 0x1}, 0x20) 21:47:41 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x7, 0x4, 0x8, 0x5900, 0x0, 0x1}, 0x40) 21:47:41 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000002f00)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x10}}], 0x10}], 0x1, 0x0) 21:47:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002087a000000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:42 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdb888f017bf7ae7, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:47:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000700)={0x0, @in={0x2, 0x0, @multicast2}, @tipc=@id, @vsock={0x28, 0x0, 0x0, @host}, 0x0, 0x0, 0x0, 0x3f00000000000000}) 21:47:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000003"], 0x24}}, 0x0) 21:47:42 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800040000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:42 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 21:47:42 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_elf32(r0, 0x0, 0x0) 21:47:42 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800050000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@array, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "b3707d"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '\v'}]}}, &(0x7f0000000280)=""/220, 0x4e, 0xdc, 0x1}, 0x20) 21:47:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0xc0}}, 0x0) connect$netlink(r0, &(0x7f0000000300), 0xc) [ 769.797520] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. [ 769.830446] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.2'. 21:47:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8917, &(0x7f0000000240)={'batadv_slave_0\x00'}) 21:47:42 executing program 2: write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)={'syz0', "463107f4a801d15a5d478119610e900a5fb426849163771236d355eef0082eed9d67a6bf7af5049fab525f24b06b40c33d5183053bdac7a058e0c98cb6d6bc84bf8ec46844fca8aed0ed0cf28527cb263faefe700483e8ccd5f433d5d5fecd849e76f4e0c057a6d8fa71770e5243e315740941079123e27a17c0343fc0f8a8d21354f927c2d2e59a2ffa7919b50f31bfee035654529bb76e09360fbc203b7a5e429665fd0c88a7f4ac37bd54ec61baa830756bf44f57d8a5b5108496b6fe6bccb9ff4f706f01248fc3b3e27ad88b"}, 0xd2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="617f00000000000000000000000000009500000000000000"], &(0x7f0000000980)='syzkaller\x00', 0x4, 0x8f, &(0x7f0000001a40)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000340)={@private1, 0x0, r2}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000340)={@private1, 0x0, r5}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r6, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000340)={@private1, 0x0, r7}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'batadv_slave_0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in=@private, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r10, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r10, 0x8916, &(0x7f0000000340)={@rand_addr=' \x01\x00', 0x0, r11}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x13ba28fe0319d205}, 0xc, &(0x7f00000003c0)={&(0x7f00000009c0)={0x55c, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [{{0x8}, {0x1ec, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffffff8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0xb9b0}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r2}}}]}}, {{0x8}, {0x270, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb7d}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r5}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x969}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r11}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}]}}, {{0x8}, {0x88, 0x2, 0x0, 0x1, [{0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0xf5, 0x4f, 0x9, 0x5}, {0x6, 0x0, 0x3f, 0x1}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x40}}, {0x8}}}]}}]}, 0x55c}, 0x1, 0x0, 0x0, 0x6000000}, 0x800) 21:47:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:42 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800060000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:42 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x6, 0x4, 0x7, 0x1, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x20) 21:47:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x1, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 21:47:42 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8936, &(0x7f0000000700)={0x0, @in={0x2, 0x0, @multicast2}, @tipc=@id, @vsock={0x28, 0x0, 0x0, @host}}) 21:47:42 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x6, 0x4, 0x7, 0x1, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x20) 21:47:42 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCDELRT(r0, 0x5411, &(0x7f0000000040)={0x0, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @sco={0x1f, @fixed}, @l2tp={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 21:47:42 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x21}, 0x0) 21:47:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x1, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 21:47:42 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800070000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020887030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:43 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 21:47:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 21:47:43 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800080000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000200)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/220, 0x1a, 0xdc, 0x1}, 0x20) 21:47:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x1, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 21:47:43 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, 0x0, 0x1100000000000000, 0x0, &(0x7f0000000100)=@abs={0x1}, 0x6e) 21:47:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 21:47:43 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) r1 = gettid() sendmmsg$unix(r0, &(0x7f0000000500)=[{&(0x7f0000000100)=@abs={0x1}, 0x6e, 0x0, 0x0, &(0x7f00000004c0)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee00}}}], 0x20}], 0x1, 0x0) 21:47:43 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800090000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 21:47:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) 21:47:43 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCDELRT(r0, 0x8901, &(0x7f0000000700)={0x0, @in={0x2, 0x0, @multicast2}, @tipc=@id, @vsock={0x28, 0x0, 0x0, @host}}) 21:47:43 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x9, 0x4, 0x7, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) 21:47:43 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x1, 0x1, 0x101, 0x0, 0x0, {}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 21:47:43 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020888030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:43 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x2) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) 21:47:43 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208000e0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xf}]}]}}, &(0x7f0000000140)=""/146, 0x2e, 0x92, 0x1}, 0x20) 21:47:43 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8918, &(0x7f0000000280)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, r2}) 21:47:43 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800130000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000031c0)={&(0x7f0000003000)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000030c0)=""/196, 0x1a, 0xc4, 0x1}, 0x20) 21:47:43 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000021c0)=@l2tp6={0xa, 0x0, 0x0, @remote}, 0x80) 21:47:44 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) gettid() sendmmsg$unix(r0, &(0x7f0000004040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}], 0x1, 0x0) 21:47:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000031c0)={&(0x7f0000003000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000004"], &(0x7f00000030c0)=""/196, 0x28, 0xc4, 0x1}, 0x20) 21:47:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800210000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x4}]}]}}, &(0x7f0000000400)=""/147, 0x2e, 0x93, 0x1}, 0x20) 21:47:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020889030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:44 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x6, 0x4, 0x7, 0x1, 0x0, 0x1}, 0x40) r1 = epoll_create(0x7) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 21:47:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000400)=""/147, 0x2e, 0x93, 0x1}, 0x20) 21:47:44 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r0, &(0x7f0000000040)='U', 0x1, 0x0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 21:47:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800230000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:44 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000240), 0x8) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, &(0x7f0000000500), 0x8) 21:47:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x19, 0x4, 0x8, 0x1, 0x20, 0x1}, 0x40) 21:47:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000031c0)={&(0x7f0000003000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x3}]}, {0x0, [0x0, 0x0, 0x2e]}}, &(0x7f00000030c0)=""/196, 0x29, 0xc4, 0x1}, 0x20) 21:47:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800480000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:44 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@abs, 0x2000016e) 21:47:44 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="48000000040601020000000000000000070000000900020073797a3100000000050001"], 0x48}}, 0x0) [ 772.069393] bridge4: port 1(macvlan0) entered learning state [ 772.075994] bridge3: port 1(macvlan0) entered learning state 21:47:44 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) [ 772.179493] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 21:47:44 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002088a030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:44 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) recvfrom$inet6(r0, 0x0, 0x0, 0x10222, 0x0, 0x0) 21:47:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208004c0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:44 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000020000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd000000100002000c0c10003b30000000000000", 0x58}], 0x1) 21:47:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000400)=""/147, 0x36, 0x93, 0x1}, 0x20) 21:47:44 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="c0000000", @ANYRES16, @ANYBLOB="01"], 0xc0}}, 0x0) recvmsg(r0, &(0x7f0000001840)={0x0, 0x0, &(0x7f0000001780)=[{0x0}, {&(0x7f00000016c0)=""/135, 0x87}], 0x2}, 0x0) 21:47:44 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) 21:47:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x19, 0x4, 0x8, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 21:47:44 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xe, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 21:47:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800680000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:44 executing program 3: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_SIOCGIFCONF(r0, 0x8982, &(0x7f0000000040)) 21:47:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x0, 0x3, &(0x7f0000000900)=@framed={{0x25, 0x0, 0xa, 0x0, 0x0, 0x4}, [], {0x95, 0x0, 0x9}}, &(0x7f0000000980)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:47:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002088b030000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:45 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000000)=0x7ff, 0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200087fd, &(0x7f0000000140)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860005cf65ac618ded8974895abeaf4cc834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfffffffffffffdbe, 0x44070, 0x0, 0x657) 21:47:45 executing program 2: r0 = socket$inet(0x2, 0x3, 0x9) sendmsg$inet(r0, &(0x7f00000003c0)={&(0x7f0000000080)={0x2, 0x0, @local}, 0x10, 0x0}, 0x0) 21:47:45 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f00000001c0)=ANY=[], 0x4240a543) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r3, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012584, 0x0, 0xfffffe53) splice(r0, 0x0, r2, 0x0, 0x6cc253fb, 0x0) 21:47:45 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x6, 0x4, 0x7, 0x1, 0x0, 0x1}, 0x40) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000000), 0x0}, 0x20) 21:47:45 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208006c0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:45 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800050000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000034c0)={0x6, 0x0, 0x0, 0x1, 0x0, 0x1}, 0x40) 21:47:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8934, &(0x7f0000000240)={'batadv_slave_0\x00'}) [ 773.357761] __ntfs_error: 140 callbacks suppressed [ 773.357774] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:47:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x2}}, &(0x7f0000000280)=""/220, 0x1a, 0xdc, 0x1}, 0x20) [ 773.411113] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:47:45 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="48000000040601020000000000000000070000000900020073797a310000000005000100070000000900020073797a30000000f90800020073797a31"], 0x48}}, 0x0) [ 773.487316] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:47:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x63, 0xc, 0x2, [@func]}}, &(0x7f0000000280)=""/220, 0x26, 0xdc, 0x1}, 0x20) [ 773.574911] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 773.587886] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 773.610230] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:47:46 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000280)={@private0, @private2, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3430254}) 21:47:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x1, 0x4) syz_emit_ethernet(0x76, &(0x7f00000000c0)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @mptcp=@remove_addr={0x1e, 0x3}, @fastopen={0x22, 0xf, "de04d843515846663a9c16e9e0"}, @exp_fastopen={0xfe, 0x9, 0xf989, "61ee5bd5ce"}, @generic={0x0, 0x9, "fc85a161d98250"}, @md5sig={0x13, 0x12, "91d785d58954605c802acf9f965fe399"}, @exp_fastopen={0xfe, 0x4}]}}}}}}}, 0x0) 21:47:46 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800740000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) [ 773.754575] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 773.764874] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 773.779824] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 773.807369] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:47:46 executing program 3: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0xc0189436, &(0x7f00000004c0)={'batadv_slave_0\x00'}) 21:47:46 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x3, &(0x7f0000000900)=@framed, &(0x7f0000000980)='syzkaller\x00', 0x4, 0x8f, &(0x7f0000001a40)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r0}, 0x10) 21:47:46 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) sendmsg$unix(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@rights={{0x18, 0x1, 0x1, [r1, r0]}}], 0x18}, 0x0) 21:47:46 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r0, &(0x7f0000002340)=[{{&(0x7f0000000000)=@ieee802154={0x24, @long}, 0x80, 0x0, 0x0, &(0x7f00000010c0)=[@timestamping={{0x14}}], 0x18}, 0x81000000}], 0x1, 0x0) 21:47:46 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208007a0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:46 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800060000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:46 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xf, 0x4, 0x0, 0x1, 0x0, 0x1}, 0x40) 21:47:46 executing program 5: r0 = epoll_create1(0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000700)={0x30000002}) 21:47:46 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b40)={0x18, 0x3, &(0x7f0000000900)=@framed={{0x61, 0x0, 0xa, 0xff00, 0x0, 0x4}}, &(0x7f0000000980)='syzkaller\x00', 0x4, 0x8f, &(0x7f0000001a40)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:47:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000140)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @mptcp=@remove_addr={0x1e, 0xd, 0x0, 0x0, "b5c70bef6c46361c534a"}, @fastopen={0x22, 0xf, "de04d843515846663a9c16e9e0"}, @exp_fastopen={0xfe, 0x9, 0xf989, "61ee5bd5ce"}, @generic={0x0, 0x3, "fc"}, @md5sig={0x13, 0x12, "91d785d58954605c802acf9f965fe399"}]}}}}}}}, 0x0) 21:47:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000031c0)={&(0x7f0000003000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f00000030c0)=""/196, 0x26, 0xc4, 0x8}, 0x20) 21:47:46 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000300000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:46 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="c0000000", @ANYRES16, @ANYBLOB="01"], 0xc0}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000500), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), r0) 21:47:46 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000002f00)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x10, 0x1, 0x7}}], 0x10}], 0x1, 0x0) 21:47:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0x4, 0x10001, 0x1, 0x0, 0x1}, 0x40) 21:47:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x64001, 0x0) write$P9_RSYMLINK(r0, 0x0, 0x0) 21:47:47 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bridge_slave_1\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="1d"]}) 21:47:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800070000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:47 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800850300000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg$sock(r0, &(0x7f0000002340), 0x1, 0x0) 21:47:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xa, 0x4}]}]}}, &(0x7f0000000400)=""/147, 0x2e, 0x93, 0x1}, 0x20) 21:47:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9}, 0x40) 21:47:47 executing program 3: r0 = socket$inet(0x2, 0x3, 0x9) ioctl$sock_SIOCGIFCONF(r0, 0x541b, &(0x7f0000000040)) 21:47:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x3}]}]}, {0x0, [0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/208, 0x35, 0xd0, 0x1}, 0x20) 21:47:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000480)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 21:47:47 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/net\x00') 21:47:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x0, 0x0, 0x0, 0x5, 0x1}, 0x40) 21:47:47 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800870300000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xa, 0x5, 0x7, 0x10, 0x0, 0x1}, 0x40) 21:47:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800090000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x1}]}]}}, &(0x7f0000000480)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 21:47:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x5, 0x7, 0x10, 0x2, 0x1}, 0x40) 21:47:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000040)=""/150, 0x29, 0x96, 0x1}, 0x20) 21:47:47 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x9, 0x5, 0x7, 0x10, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 21:47:47 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800880300000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:47 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f00000012c0)="6e12e6b3ff0e9231559232e77fdeb117ce98a8052386e98eff1fc60d4210a9f71cbf12fb3aa0a4a280097779af2fb290e2d0aa8e89f3fe62168794416e0dbf122c0df9850dea93a3ec168d65e99eef25255186c165d9d8b91d70c62b141789d7c83e43467a89bdac48dcd74289bd4556aa37bf8b35a3e05e022ad221dd92583fb40cafc7e9bcb8a95f80facca4ffb922fe9b83d097c8c4e7f9670679c01049c15500339bb7ebd3d993aa082fcebed74983dd655063fcb42341b1bc8a5e248287adc789cb57740f61d3dac18cd428f8ed67c966410ebcbc5c7fa3d9cedc1778", 0xdf}, {&(0x7f00000001c0)="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", 0xde1}, {&(0x7f00000011c0)="05", 0x1}], 0x3}, 0x0) 21:47:47 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x5, 0x20, 0x8, 0x5, 0x0, 0x0, 0xe140, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x18a80, 0x5, 0x283e, 0x0, 0x3, 0x5, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xf3, 0x0, 0xc0, 0xc6, 0x0, 0xe98, 0x50404, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000200), 0x1}, 0x40100, 0x0, 0x574c796d, 0x9, 0x0, 0x6, 0x9, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0x0, r1, 0x2) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x400, 0x1, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x20, 0x2, 0x5, 0x9, 0x0, 0x6fd0, 0x4014, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x2, @perf_config_ext={0x6, 0x3f16}, 0x91, 0x5, 0x4, 0x0, 0x40, 0x9, 0x6, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x4, r2, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x0, 0xfd, 0x3, 0x1, 0x0, 0x3, 0x21611, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x8021, 0x8, 0x0, 0x8, 0xfffffffffffff703, 0x1ff}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 21:47:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/151, 0x1a, 0x97, 0x1}, 0x20) 21:47:47 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800890300000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:48 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000040)=""/150, 0x26, 0x96, 0x1}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x3, &(0x7f00000003c0)=@framed, &(0x7f0000000440)='GPL\x00', 0x1, 0xe6, &(0x7f00000005c0)=""/230, 0x0, 0x0, '\x00', 0x0, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x0, 0x401}, 0x10}, 0x78) 21:47:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0x5, 0x7, 0x10, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 21:47:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208000e0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:48 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x104, 0x303, &(0x7f0000000040)="b90103600000f000009e0ff088f71fffffe10e006021633a77fbac141441e0002001be3e7d2a182fff", 0x0, 0x104, 0xa000000, 0x0, 0xfeb9, &(0x7f0000000640)="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", &(0x7f0000000100)}, 0x28) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000100)={r0}, 0xc) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 21:47:48 executing program 5: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$sock(r0, &(0x7f0000003480)={0x0, 0x4, &(0x7f0000003340)=[{&(0x7f0000002c40)='\x00', 0x1}], 0x300}, 0x0) 21:47:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x1}]}]}}, &(0x7f0000000480)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 21:47:48 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208008a0300000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:48 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0xa, 0x2, 0x5cf, 0xeeda, 0x0, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4}, 0x40) 21:47:48 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x5, 0x20, 0x8, 0x5, 0x0, 0x0, 0xe140, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x18a80, 0x5, 0x283e, 0x0, 0x3, 0x5, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xf3, 0x0, 0xc0, 0xc6, 0x0, 0xe98, 0x50404, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000200), 0x1}, 0x40100, 0x0, 0x574c796d, 0x9, 0x0, 0x6, 0x9, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0x0, r1, 0x2) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x400, 0x1, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x20, 0x2, 0x5, 0x9, 0x0, 0x6fd0, 0x4014, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x2, @perf_config_ext={0x6, 0x3f16}, 0x91, 0x5, 0x4, 0x0, 0x40, 0x9, 0x6, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x4, r2, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x0, 0xfd, 0x3, 0x1, 0x0, 0x3, 0x21611, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x8021, 0x8, 0x0, 0x8, 0xfffffffffffff703, 0x1ff}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 21:47:48 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x27, 0x303, &(0x7f0000000040)="b90103600000f000009e0ff088f71fffffe10e006021633a77fbac141441e0000c01be3e7d2a182fff", 0x0, 0x104, 0xa000000, 0x0, 0xfeb9, &(0x7f0000000640)="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", &(0x7f0000000100)}, 0x28) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000100)={r0}, 0xc) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 21:47:48 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208008b0300000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:48 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001280)=[{&(0x7f0000002c40)='\x00', 0x1}, {&(0x7f00000012c0)="6e12e6b3ff0e9231559232e77fdeb117ce98a8052386e98eff1fc60d4210a9f71cbf12fb3aa0a4a280097779af2fb290e2d0aa8e89f3fe62168794416e0dbf122c0df9850dea93a3ec168d65e99eef25255186c165d9d8b91d70c62b141789d7c83e43467a89bdac48dcd74289bd4556aa37bf8b35a3e05e022ad221dd92583fb40cafc7e9bcb8a95f80facca4ffb922fe9b83d097c8c4e7f9670679c01049c15500339bb7ebd3d993aa082fcebed74983dd655063fcb42341b1bc8a5e248287adc789cb57740f61d3dac18cd428f8ed67c966410ebcbc5c7fa3d9cedc177817885c", 0xe2}, {&(0x7f00000001c0)="c17e6d60c330f9d5d27dd756e008113865d869e0890d13b350de258a12ef37f8e91a6805f0b6d3b2f8d26b0ef70347a0b83dffa52c2009f4b02152b0d7634698f73004704626c6a67877dbee8fd01301c6e1209d83d540b8a94649a2f6037129970270b6d5f93ef4c6357830da4c20618c5ad806fadbf103daf7f420aabd2dc403fc4ea61b730f9b52bdd05f42ed8cf88958dea8d66ec7303dc6779ab761da9c087b8b9fb97283f378934bcbf27f4b7a4236280292bfadd1318203d31c93a3fd5d60a4425e9abccb050f53479376fdac449fea7d7a3a2d7327176deab999629ad79fa5c31eb18844d46144127a76117ffb7448f23b184e019af310d86d62f31d9f53315e4c3569bf89bd422c9b19d1166d12e88c6ff8ae50741791325f2b4ce71d9f377387cb4364d87f520ba8369c72794bca76f75f3b630963d8286bf54aa02d8eb2787466ce4cff161ab0837b8bff56a68cc5991c0b5af0e14ae5504817697acb53716c2f415568735ee3f321d8913cbefe201dd6bbf4c7a8a38b168e4c2ef4bdaf6b38e15acfb5f1c58dc9b0e1b4ae91fc6e6c29b61f444ada90723d272d9c2cd9e81f501df6e2cda8474546ebce9b6b911234fae090b38ac058c4788c360ee6223f8ff8a84cc056a7545addf97dd5177d150989afd454dcd8918ad9f1866af0e8c754bdc3ebb87dc1a5a945cf067a36a2cf953f8e1b9d131550c1425fcd37a4d3c9ed07bc4ebabcf1ab5b3ef9bbe1864d9965c5f67a094a13425f37d0bcea47a693959fc66c28be9b6f97b08f499c40e1e92f112a68e7602d1994738d1181da1fa5378434635bf6cba18fac04065c890d55514242e6c5179e7609f6494d7ec3074ff693f2ded7c7382bed61807c42e4acdc7e80e292348efe70d22b19c2aca5c4eed6f189b3c632b79b8e5e2e046bf462dc8b41d50bf008a29cf00f48d8e5b202429432d02e961f386961853fed0ebdca5cbd6009c73d2b709f4ab66f82d00b21670c73eea6c52cba9ba5e4d91890e6ed1d1b80fc8243b577521187a2fc7924bd988819250292253c1a7f16d17bdf4898be361ced00b12f18790684e1d78105d55b42183306aee9de07d00dbda20460a666889bd8edd0bd900e3efe3b571c86c9ab342291fb895c91a6b85de3145cd4c421cdc212ee8395a85508fa4a66e84103009bb856fec92c73a88fa5f28885cacd5abd8685cf576bcf380483c9a45a8ee85a8abb02cca40743398fdb0db66066507648a4e367f669f998563a489e1c7a5733a8c2e4bb11869aa7a66f9e920d761bbb4e115493179f5b2290d9fe5b931d6cd6425a8ed5210ab925187c0f9e7f71779c5fa08dc010e10488b178efb9b9612e378bffb5723b9b0f63c02348ac41ce2c3f3ec767b64f69b7d129f213cdd6405226fe7650b27308424002f33c508d759229c23e386a4c6cb5ae58a7446ea7b831b70f5412cfce5a775ebff2527d431318095523a8e6906f42a37f5d44cb88279f365e30e799447811eaec387b116e999bd335e3f6e5d861ee1c80aae44d04449c19de91aeca6b453a529ad700c49c8b11983f29d3f311df7c35eaef732a2c5993bb627ad43f8c49172b76fd3eab2ba7274e2081350c17b749a2705f97f7fd06fae6150f100b2591d89148e683e4defd648745d32acc1c3ea02e1a3480206d2d1b523f8375af8ae241eacf95df5be5a073be19854153ecc081c31c62ca8d6286c06e2f517e6487480cf2ea32f4319e653eadb76e91ea003a0be18fd9e5f45105bd0230c77b2ee80604462f58f77ec2381ddd67d48140ba15a533504bcb210290b8275c926ccf8a85d616339795522c7115ef17181b50fb3ef9c2142f752289657b247c44ca6e134b0ae7885975d5b27644bab75bb32a4ebcca23728e34f5352b3223ec5ae6890a147c6e335225c3969c03d235cc925ff984bf41d67caf82ca71e653b1732f82dcf0e64d42a792778ad3c01c563b68a4fd1c585629b1545b32f5535b70b17cbf68a85e02005473f4ccc228c8a927fd94a1cee7e08c924c6c25e2feff3f9bd1f4f88fe730d30cbc06ea3b88d9d8c552cd1a591a456d993939e9cefbfe7a1c51e55a30fa109e29182af4b3fd091212b874cd81e1632d32d011acf599e76f9c2aa3709ae1b2512d6cf36b6dc00b14845b92cd4429951f2eb48a9c2f0f6038f6a9a34b743bbdb05fea4b927a2d18c7e9527db08f0e878f22514eb45aa8a1eecd8a57eb0aa2bae55cdbb6f1b5a4b9ece3fa19d7cb1d33d99b274b15049c4330070d273291fdcd17aedec26bc855f46225c432f6bfc2d51577c1cd7cc8541226489c60ba71e27f3429f9f296e27b3c775a5ac0f21e9366aa86731b9e2a0a1f4d3dd4ad1d0f06448ea5c2c3f4cdc8883f6796552157c5dfade4a2783868db075957f269d9dc2081b88d57e9f7377b3e28138fe3d375c4d11f4737e9607ef6ea53ad05de1631849142ac4564e1111c1b7fb028699da4d36b6f36201631ee991218231ede06a6122949b116af0e107ddeba9a6846e210c9fbe6d24dda2186bf008f8a33e5750e2ef82aff89992b0fed29e579499664cc37581f7aed4dd153e85c69454edac5bd81f8b98454efb3f208600f80b78b91f7ec3194cb512dbbaeb7d4816712e320db114c8bd11ae98433e10417b248c83dd8c54e19e2cfe15223efb186cff44fb8ccd6f66caacaed3e92b76c2a4298979eb433f7aea94c82571106f78041c86d0bfc061bc0205b2591e3e4c17a0067236ae73379d2c29bf8ef27f1b4e326f0a0699ec5f831d2a839153b3b11d3ebb6eced991df7fe6810215bde8b2cb158966cd3bac20779b2bec1bd209b4c26bc5202fb6f87ae4297077759346d8cccfc709111fba7d3c0e32aecd95ab7423a15b7bfaced879fbc961e3c910d0fbd7a8b8e61d5c9409d08a3d83815a95f98c5e1574e3f90549c9264397368260d6846375ea4c65eddd58238a4e100cf5cfb6f22ba1c5ba621af2a8a9500e54dd977fc3923282673aa3d5e00bfbc9a7cbacc58dcfadf274971317b3f5bb61894931afac156943c799675ad032e625b7f3bb69bd94ca5dec6546619bef87e48e733a63ab59a84a2416e19548a603d38fccbf3db7b5aa0382830e0b7e86c71292d2615c987289ab567b54a27b18406c0441b54d9a858e6602c73da70f29f2501694e62596f4c715dd0185220f75aa604d61a02870b19898b67216d8eeccd5debc73fe88afa696f1201b31654055afc4522bcadf3635191e9d7db54b8625c6355b46110992c7e919bcc6f3f2c147f16740d4b38d10a6e62d69a9a60e43f8d39b70c94b346cabf6e80c4219648d7c91a8584418c186ea0fc4999ca4c0ca34fd6d09ae1751e8d00c0c26ed06b614139a410622c931165800538ef6f910facdbe0435a7c49568cc16fee56429b3005d986c506bd79944458ba6173d2b6ef9b5000b544dca5fce9b3126360be0eea6dadac7150484326f1402b7c8e7203e4a5b71becefd04c5aee5f7b7c4a75bcb1d1d2f1a50b313ec8114f66737ab5ce2df792d72aaff6a223cef710b33722e0843ae0deb7b8d679a4f206eb2590c7c6fb6c7ab2b70bce9b434f7925859283e28dea115e40d089b9e9f21ed357457a85d8effd492336d7a0d3e404ba30aecf0c26609c719e90c634fc50186c2ab9c36da73c35dbf5ff3afc916777421d99a21412a3014a595258ba6f98cdbadd0873642e504e234ff2110e898800b2f8f06d8a303690283087dc1c8ad54dacae490d8d017f7ecbb1201fa71fa0c656ce798c7834e8e5f08aa2f2422badda010042f2d4ff6a7841acd36e03b0f3e81e193e4954ee947c51cf123f4bc8b6060eb9840fe9987f6d92f94bc7447c4919669f26ccd104a4625197a7bb282954cd87c5ed7bf0fc0d87eb8538252bff1ea58bdf09f063d25b59ed576665927b6f73d5d7079d3b9e7db928c6ea5e102e3e76a92c94a91b505baab2ae82feaa179eefb24db6733acafa5c3a8b67e65241118cd43b0c8fa2365df6bd8e3f8bb1482ccb64e7a38940ffc6869ddbecf220a349c1763c420be46502e23ab10f01c108abf003aa3f063000df00ed12993ae2b5d907dfbc901ec76a894d93450ca00571da1ae98ad34525ed8c9ae5dd919876490966e8791d8939a18196f2d8fc59f1b18e039df069da70b8c2219cfc1e56380ceb1c5ac522d93bacc984fec6ee60877251ef31b8e48b55f83e6a4cebb1885dd8c877c87c89ef712bd1237ef525dfd9aafc4e52550fb7dc7ddf85a5ab14f012b5ebc4bcdd0789acf6d6934df143b1b96f57d907feb2bfdffe225b0f31330c627c2e82d735951687a84c292a780e2d84026e6af3389e978ec1077796a27fcf589877196cfcc373240b9ceb0145bca5ae639077004ef1dbbd99c834206d85e1ae7f3f3d7e9c09840e7adfa43d56b1659712aa34e70604080750e0b59a4580ab451081d076962d21941b113e41bd9c5323d5d4ad5e243716f6b767d371ca1cac73e975954a9759e06c8689fe3876a3c694c7627590a23d8b3176d75c8bf112f8eb5829d12037937ded14b90d7bef55d9c6d1daa5f9623886088cfbecd4f1d8fde9107304e722266ebc8c88669bd3c8cd1332267526128a17f1f0a99cd49f15ccfe7971531ccce187ecc563cf0f489e561bbf8fecc4ffd0dc89166e184021604762ad5776f3454706ae747b732b22707fd419823d3b5b457fae0716df23753f53aacd1cd40a1904709b3223590e3d5ea8f8ad66fede5978b47031938871396be7a5cd091c57093f54ad18f3b68c86d3175d1ef31414863945228b33086b28b4c294d68953607baf1f5963fb93641d432ac3e400331e2d0968ec8f774cc9a9a3ee943561a8e96bb4da4d53ad2561b055cdf49fb4da7cee219ae0320c26d92569c36ade88d8b2d3ae21f03459110e9bf3d30196492d7b603ec37dcc14a61f1429388fa0d8b9628a8000f191d98f31e091dd6ec32a5c8eba674b5c48266e432d6b3e171c990eef449cc4b872879b75d0f8067e8d7c0e4385a6523faee6", 0xdde}], 0x3}, 0x0) close(r1) 21:47:48 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208008c0300000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:48 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x5, 0x20, 0x8, 0x5, 0x0, 0x0, 0xe140, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x18a80, 0x5, 0x283e, 0x0, 0x3, 0x5, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xf3, 0x0, 0xc0, 0xc6, 0x0, 0xe98, 0x50404, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000200), 0x1}, 0x40100, 0x0, 0x574c796d, 0x9, 0x0, 0x6, 0x9, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0x0, r1, 0x2) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x400, 0x1, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x20, 0x2, 0x5, 0x9, 0x0, 0x6fd0, 0x4014, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x2, @perf_config_ext={0x6, 0x3f16}, 0x91, 0x5, 0x4, 0x0, 0x40, 0x9, 0x6, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x4, r2, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x0, 0xfd, 0x3, 0x1, 0x0, 0x3, 0x21611, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x8021, 0x8, 0x0, 0x8, 0xfffffffffffff703, 0x1ff}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 21:47:49 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800130000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:49 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000940)='./file0\x00', 0x0) 21:47:49 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x100, 0x1}, 0x40) 21:47:49 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f000000a780)={0x12, 0xffffffff, 0x0, 0x3, 0x0, 0x1}, 0x40) 21:47:49 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208008d0300000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:49 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x5, 0x20, 0x8, 0x5, 0x0, 0x0, 0xe140, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x18a80, 0x5, 0x283e, 0x0, 0x3, 0x5, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x2) r2 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xf3, 0x0, 0xc0, 0xc6, 0x0, 0xe98, 0x50404, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000200), 0x1}, 0x40100, 0x0, 0x574c796d, 0x9, 0x0, 0x6, 0x9, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0x0, r1, 0x2) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x400, 0x1, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x20, 0x2, 0x5, 0x9, 0x0, 0x6fd0, 0x4014, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x2, @perf_config_ext={0x6, 0x3f16}, 0x91, 0x5, 0x4, 0x0, 0x40, 0x9, 0x6, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x4, r2, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x0, 0xfd, 0x3, 0x1, 0x0, 0x3, 0x21611, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x8021, 0x8, 0x0, 0x8, 0xfffffffffffff703, 0x1ff}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 21:47:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf}]}]}}, &(0x7f0000000480)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 21:47:49 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x12) 21:47:49 executing program 5: socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000001e00)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{}, 0x1}}, 0x10, 0x0}, 0x0) 21:47:49 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800a80300000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:49 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) close(r0) 21:47:49 executing program 5: socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000001e00)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{}, 0x1}}, 0x10, 0x0}, 0x0) 21:47:49 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208001f0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:49 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0xda00) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, &(0x7f00000005c0)) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:49 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x4a00, 0x0) 21:47:49 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000500000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:49 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x2) r1 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xf3, 0x6, 0xc0, 0xc6, 0x0, 0xe98, 0x50404, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000200), 0x1}, 0x40100, 0x0, 0x574c796d, 0x9, 0x81, 0x6, 0x9, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0xc, r0, 0x2) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0xde, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x400, 0x1, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x20, 0x2, 0x5, 0x9, 0x0, 0x6fd0, 0x4014, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x2, @perf_config_ext={0x6, 0x3f16}, 0x91, 0x5, 0x4, 0x0, 0x40, 0x9, 0x6, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x4, r1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x0, 0xfd, 0x3, 0x1, 0x0, 0x3, 0x21611, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x8021, 0x8, 0x0, 0x8, 0xfffffffffffff703, 0x1ff}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 21:47:49 executing program 5: socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000001e00)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{}, 0x1}}, 0x10, 0x0}, 0x0) 21:47:49 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003580)={0x18, 0x3, &(0x7f0000000000)=@raw=[@ldst={0x0, 0x3, 0x0, 0x0, 0x4}, @initr0], &(0x7f0000000080)='syzkaller\x00', 0x7, 0x99, &(0x7f00000000c0)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:47:50 executing program 5: socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000001e00)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f00000001c0)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{}, 0x1}}, 0x10, 0x0}, 0x0) 21:47:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000600000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x10, 0x0, 0x1}, 0x40) 21:47:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f0000000980)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@union={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, &(0x7f0000000b00)=""/163, 0x2d, 0xa3, 0x1}, 0x20) 21:47:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x3}]}}, &(0x7f0000000040)=""/150, 0x26, 0x96, 0x1}, 0x20) 21:47:50 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800200000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x40) 21:47:50 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x10, 0x0, 0x0, 0x10, 0x0, 0x1}, 0x40) 21:47:50 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x2) r1 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xf3, 0x6, 0xc0, 0xc6, 0x0, 0xe98, 0x50404, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000200), 0x1}, 0x40100, 0x0, 0x574c796d, 0x9, 0x81, 0x6, 0x9, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0xc, r0, 0x2) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0xde, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x400, 0x1, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x20, 0x2, 0x5, 0x9, 0x0, 0x6fd0, 0x4014, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x2, @perf_config_ext={0x6, 0x3f16}, 0x91, 0x5, 0x4, 0x0, 0x40, 0x9, 0x6, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x4, r1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x0, 0xfd, 0x3, 0x1, 0x0, 0x3, 0x21611, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x8021, 0x8, 0x0, 0x8, 0xfffffffffffff703, 0x1ff}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 21:47:50 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0xc020660b, 0x0) 21:47:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000700000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002dc0)={&(0x7f0000002c40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x6, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2}}, @const={0x0, 0x0, 0x0, 0xa, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3}}, @typedef={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000002cc0)=""/235, 0x66, 0xeb, 0x1}, 0x20) 21:47:50 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x5, 0x5, 0x7, 0x10, 0x0, 0x1}, 0x40) 21:47:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f0000000980)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000b00)=""/163, 0x26, 0xa3, 0x1}, 0x20) 21:47:50 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x9, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000020000000000800000095"], &(0x7f00000015c0)='syzkaller\x00', 0x7, 0xd2, &(0x7f00000002c0)=""/210, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:47:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000900000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:50 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x15, 0x0, 0x0, 0x0, 0x9b4}, 0x40) [ 778.413207] __ntfs_error: 119 callbacks suppressed [ 778.413218] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 778.464640] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 778.489148] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 778.574106] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 778.584569] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 778.598359] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. [ 778.618137] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 778.628359] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 778.641597] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 21:47:51 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800230000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:51 executing program 5: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$sock_int(r0, 0xffff, 0x1008, &(0x7f0000000040), &(0x7f0000000080)=0x4) 21:47:51 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x2) r1 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xf3, 0x6, 0xc0, 0xc6, 0x0, 0xe98, 0x50404, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000200), 0x1}, 0x40100, 0x0, 0x574c796d, 0x9, 0x81, 0x6, 0x9, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0xc, r0, 0x2) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0xde, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x400, 0x1, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x20, 0x2, 0x5, 0x9, 0x0, 0x6fd0, 0x4014, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x2, @perf_config_ext={0x6, 0x3f16}, 0x91, 0x5, 0x4, 0x0, 0x40, 0x9, 0x6, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x4, r1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x0, 0xfd, 0x3, 0x1, 0x0, 0x3, 0x21611, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x8021, 0x8, 0x0, 0x8, 0xfffffffffffff703, 0x1ff}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 21:47:51 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, 0x0, 0xffffffffffffff9c, 0x0, &(0x7f0000000180)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 21:47:51 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f0000000000)={@local={0xfe, 0x80, '\x00', 0x0}}, 0x14) 21:47:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800000e00000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:51 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000640)={'netpci0\x00', @random}) [ 778.889936] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:47:51 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000640)={'macvtap0\x00', @random}) 21:47:51 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x9, 0x2000000000000242, &(0x7f0000000040)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 21:47:51 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8}, 0x0, 0x3, 0xffffffffffffffff, 0x2) r1 = perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0xf3, 0x6, 0xc0, 0xc6, 0x0, 0xe98, 0x50404, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000200), 0x1}, 0x40100, 0x0, 0x574c796d, 0x9, 0x81, 0x6, 0x9, 0x0, 0x9, 0x0, 0x9}, 0xffffffffffffffff, 0xc, r0, 0x2) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000300)={0x4, 0x70, 0xff, 0xde, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x400, 0x1, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x20, 0x2, 0x5, 0x9, 0x0, 0x6fd0, 0x4014, 0xc, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000000, 0x2, @perf_config_ext={0x6, 0x3f16}, 0x91, 0x5, 0x4, 0x0, 0x40, 0x9, 0x6, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x4, r1, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x0, 0xfd, 0x3, 0x1, 0x0, 0x3, 0x21611, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x8021, 0x8, 0x0, 0x8, 0xfffffffffffff703, 0x1ff}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x9) 21:47:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800001300000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000440), 0x8) 21:47:51 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002088c270000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:51 executing program 5: openat$ptmx(0xffffff9c, &(0x7f0000000000), 0x108405, 0x0) 21:47:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@un=@file={0xa}, 0xa) 21:47:51 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x4, 0x0, 0x0) 21:47:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800001f00000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:51 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 21:47:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000040), &(0x7f0000000080)=0x8) 21:47:51 executing program 5: unlinkat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/../file0\x00', 0x0) 21:47:51 executing program 3: futimesat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) 21:47:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt(r0, 0x1a6c0cef, 0x0, 0x0, 0x0) 21:47:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800002000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:52 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)='y', 0x1}], 0x1, &(0x7f0000000440)=[{0x28, 0x0, 0x0, "dbedba533498eebf357f1ad594d641145147beb44cbbcb5273"}, {0x20, 0x0, 0x0, "ef22f2b4b26c18f5d1dc614019565b4980"}, {0x50, 0x0, 0x0, "efb3490ae13665786ff66f8865f9de3f5d11bc2ed55ce0ccbe72b6defeee0ffc64199825986152a07957aa9de301ad9ae3014c3416232b0463f8aa7b8e157183fb"}], 0x98}, 0x0) 21:47:52 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e544653202020200002089b270000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:52 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x9, 0x0, &(0x7f0000000140)) 21:47:52 executing program 2: fchownat(0xffffffffffffff9c, &(0x7f0000001e40)='./file0\x00', 0x0, 0x0, 0x0) 21:47:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x1, &(0x7f00000000c0), 0x8) 21:47:52 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) recvmsg(r0, &(0x7f00000018c0)={0x0, 0x0, 0x0}, 0x400c2) 21:47:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800002100000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:52 executing program 0: semget(0x0, 0x0, 0x5a5) 21:47:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) sendto(r0, &(0x7f00000000c0)="de0d", 0x2, 0x1, &(0x7f0000000100)=@in={0x10, 0x2}, 0x10) 21:47:52 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000180)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 21:47:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0xc}, {0xc, 0x84}, {0xc}], 0x24}, 0x0) 21:47:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800602200000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:52 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000001600)={&(0x7f0000000180)=@in={0x10, 0x2}, 0x10, &(0x7f0000001480)=[{0x0}, {0x0}, {&(0x7f0000000480)="af", 0x1}], 0x3}, 0x0) 21:47:52 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) shutdown(r0, 0x1) 21:47:52 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockname(r0, 0x0, &(0x7f0000000040)) 21:47:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind(r0, &(0x7f0000000180)=@in={0x10, 0x2}, 0x10) 21:47:52 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f00000005c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 21:47:52 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208003f0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800002300000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800552600000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:53 executing program 5: mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) 21:47:53 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, 0x0, 0x0) 21:47:53 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) 21:47:53 executing program 0: openat$ptmx(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) 21:47:53 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000580)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[{0xc}], 0xc}, 0x0) 21:47:53 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname(r0, &(0x7f0000000040)=@in, &(0x7f0000001440)=0x10) 21:47:53 executing program 0: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) 21:47:53 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto(r0, &(0x7f0000002540)="7bc94b041b9451ad7272f6821218a5cee084d38c6075b9bd22d60f88264b91119d3b9615e03ddecc13a9d6d2feda131f5e5c3d8bfebe69d272128c808275ba27b475a06bec4737c6c0e0021a4d1b731f7638f11e5a3d92acdf7e7ff4e5", 0x5d, 0x104, &(0x7f0000001bc0)=@in6={0x1c, 0x1c, 0x1}, 0x1c) 21:47:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800b62600000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:53 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800400000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg(r0, &(0x7f0000001640)={&(0x7f0000000000)=@in, 0xfffffffffffffe99, &(0x7f0000000080)=[{0x0}, {0x0, 0xfffffd94}, {&(0x7f0000002780)=""/4104, 0x1008}], 0x3}, 0x0) 21:47:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000580)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000940)=[{0xc}, {0xc}], 0x18}, 0x0) 21:47:53 executing program 3: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect(r0, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 21:47:53 executing program 0: symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000002500)='./file0\x00') open$dir(&(0x7f0000000040)='./file0\x00', 0x300, 0x0) 21:47:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208003b2700000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800b02700000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:53 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) connect(r0, &(0x7f0000000140)=@in={0x10, 0x2}, 0x10) 21:47:53 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000004040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x5000}], 0x1, 0x0) 21:47:53 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs, 0x80) 21:47:53 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000580)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 21:47:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1}, 0x1c, &(0x7f0000000540)=[{&(0x7f0000000080)="04", 0x1}], 0x1, &(0x7f00000005c0)=[{0xc}], 0xc}, 0x0) 21:47:54 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800480000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:54 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x10, 0x2}, 0x10) 21:47:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 21:47:54 executing program 3: fcntl$lock(0xffffffffffffff9c, 0xd, &(0x7f0000000000)) 21:47:54 executing program 2: getgroups(0x1, &(0x7f0000000880)=[0x0]) 21:47:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800273b00000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:54 executing program 2: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) sendto(r0, 0x0, 0x0, 0x1, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 21:47:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendto(r0, 0x0, 0x44, 0x0, &(0x7f0000000080)=@in={0x0, 0x2}, 0xa) 21:47:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x100, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) 21:47:54 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x4b, 0x0, &(0x7f0000000240)) 21:47:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800003f00000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r0, 0x0, 0x9, &(0x7f0000000300)="86d9fbc6", 0x4) 21:47:54 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208004c0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000580)={&(0x7f0000000000)=@un=@abs={0x8}, 0x8, 0x0, 0x0, &(0x7f0000000180)=[{0xc, 0x84, 0x8}], 0xc}, 0x0) 21:47:54 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x901, &(0x7f0000000040), 0x8) 21:47:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="c5aa421d887d453badd71df438ddd21c8213fdf7d4e1b8daa03be0d268457859c9c2bd5b70ad7ea440da79", 0x2b}, {&(0x7f0000000100)="cce5dae0127504a0a1510fe4843a04372e95e09f649d026a5d65e81ee904be9d929673c818d64a9fd2126d800c60cc07a55d04f940b1f0b500cc3afd49827dc251af15fe4efe45b9984ea85bc328aeb81bfb3d9159", 0x55}], 0x2}, 0x0) 21:47:54 executing program 5: r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 21:47:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800004000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:54 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[{0xc, 0x84, 0x8}], 0xc}, 0x0) 21:47:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)='y', 0xffffffffffffffec}], 0x1}, 0x0) 21:47:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800004800000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:54 executing program 5: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000002c0)=""/184, 0xb8}], 0x1}, 0x80) 21:47:54 executing program 2: setpriority(0x2, 0x0, 0x4df0784b) 21:47:54 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000005a80)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003880)=[{0xc}, {0xe4, 0x0, 0x0, "9b6c35cb73b1ae8a0b4333a7f86ead0c182f4bcb4bcd869d5fb0f1b32722ca0a3f4d270e6b3eef9fd7af84b2f7db3bd07bf81f266e42bd1ded4edae38d2103d8d7825cbbe2d9aaf9cc21f5a80ef59ab3d7c6d78193104f0e4984650a324f895da284d7902e732af9601a04831382a45b7f177ce20b584090cc440f3d5620c226e7432b3e0bbf2cb3481e7089d7b577d837feb31ad8f13d1b0e7d23f781ca75b5c7f332790bc1ce5a10fe4bdfb7b220feb90acff9679b4a9bd2431c04f9f12967ca7c16680900bc1cccb091d5b2fe91b7ff6352b946"}, {0x710, 0x0, 0x0, "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"}], 0x800}, 0x0) 21:47:55 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800680000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800004c00000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x10, 0x2}, 0x10) 21:47:55 executing program 0: pipe2(&(0x7f0000000000), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4) 21:47:55 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000040)=@in6={0x1c, 0x1c}, 0x1c) 21:47:55 executing program 2: setpriority(0x2, 0x0, 0x4df0784b) 21:47:55 executing program 0: bind(0xffffffffffffff9c, 0x0, 0x0) 21:47:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800265500000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:55 executing program 3: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$sock_timeval(r0, 0xffff, 0x1005, &(0x7f0000000540), 0x8) 21:47:55 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r0, &(0x7f00000000c0)="de", 0x1, 0x1, &(0x7f0000000100)=@in={0x10, 0x2}, 0x10) 21:47:55 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000300)={&(0x7f00000000c0)=@abs={0x8, 0x1}, 0x8, 0x0}, 0x20100) 21:47:55 executing program 0: symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000002500)='./file0\x00') linkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 21:47:55 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208006c0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:55 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) accept(r0, 0x0, 0x0) 21:47:55 executing program 5: msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 21:47:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800226000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:55 executing program 0: r0 = socket$inet6_udp(0x1c, 0x2, 0x0) connect(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) 21:47:55 executing program 2: setpriority(0x2, 0x0, 0x4df0784b) 21:47:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, 0x0, 0x0) 21:47:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="c5aa421d887d453badd71df438ddd21c8213fdf7d4e1b8daa03be0d268457859c9c2bd5b70ad7ea440da79bd0182c32d1e", 0x31}, {&(0x7f0000000100)="cce5dae0127504a0a1510fe4843a04372e95e09f649d026a5d65e81ee904be9d929673c818d64a9fd2126d800c60cc07a55d04f940b1f0b500cc3afd49827dc251af15fe4efe45b9984ea85bc328aeb81bfb3d915983cc48123e155e", 0x5c}, {&(0x7f0000000180)="66e7913d95fb405dc35fe783d8896276cddee17eb02fd6e477c9345d3975e009a8f48484fed06cf2d054188e1afc421ed6d7609b621f1061947222fdc859103bb99dd96d95005339a126a06b196d954c60ef604df7979a92036b4460", 0x5c}], 0x3, &(0x7f00000002c0)=[{0xd0, 0x11, 0xfffffff9, "1b8ce964cee97163b38d824ffd1dbbfc00b7a4a193ed8807de8ba53e49da1662ef40b1f5d13d2f51a79a475814675b56e85fe36c346c14871686de9adbeba29c3211d65861c3bf59e27095038173ffbde9b9464b71556353928222d002a5a49d74828c0efa4fce003b8db5718fca2ba456da5105993cbbb9e284c1085fa67b43f5045994c346fcb89ac4c4994104529c450b74120234764e911183b2b0d2771ddb3d65ef390afb6ebe83594f8288fda8d1dfc18f03d5ae90faac1602ff4368744113"}, {0x80, 0x11, 0x2, "89fae29c6a05e5ce6c86c3dc34a68ecde2fcf4403b3ee3741095e969e7270601a67404e4bd8b8f0107d0f2434c330fed557c21b7e726e6dcda170738c71add715a21d91afefc5f51a947423a2570e9f3fc7bc1fbd67975a523571ba7cc31e7712323ba29d7f3e05346e122b48bacd276ed"}], 0x150}, 0x0) 21:47:55 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, &(0x7f0000000280)=[{&(0x7f00000000c0)="c5aa421d887d453badd71df438ddd21c8213fdf7d4e1b8daa03be0d268457859c9c2bd5b70ad7ea440da79bd0182c32d", 0x30}, {&(0x7f0000000100)="cce5dae0127504a0a1510fe4843a04372e95e09f649d026a5d65e81ee904be9d929673c818d64a9fd2126d800c60cc07a55d04f940b1f0b500cc3afd49827dc251af15fe4efe45b9984ea85bc328aeb81bfb3d915983cc48123e155e", 0x5c}, {&(0x7f0000000180)="66e7913d95fb405dc35fe783d8896276cddee17eb02fd6e477c9345d3975e009a8f48484fed06cf2d054188e1afc421ed6d7609b621f1061947222fdc859103bb99dd96d95005339a126a06b196d954c60ef604df7979a92036b4460", 0x5c}], 0x3}, 0x0) 21:47:55 executing program 2: setpriority(0x2, 0x0, 0x4df0784b) [ 783.434323] __ntfs_error: 134 callbacks suppressed [ 783.434336] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 783.458211] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 21:47:55 executing program 0: symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') open$dir(&(0x7f00000000c0)='./file0\x00', 0x1, 0x0) [ 783.505323] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 21:47:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r0, &(0x7f0000001740)="4769458ae42ae67d2a22fb4e7706bb116f611f3b87f9a3c9fc4967787e4a7bf9499c7ccb01030d2ce2fbd387620588072780bf7283fe7111a55533fd658dbc323af44519b6f0fc186c23a59302d07a0805e8ff17c471365a3c01a0df712e0a404f4121d226e81cf73a6e7a13252204485c41d7ff3c29faf1d8a14735b71d5313c310d489fb0f600e8efad846c0ea45bd270f476f41201465528a057e755fe49a61fab3855cacb1db2d", 0xa9, 0x0, &(0x7f0000000040)=@in={0x10, 0x2}, 0x10) sendto(r0, &(0x7f00000000c0)="de0d28c49220fba7f3d3158d", 0xc, 0x1, &(0x7f0000000100)=@in={0x10, 0x2}, 0x10) [ 783.748434] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 783.772429] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 783.794446] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. [ 783.844212] ntfs: (device loop1): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 783.858138] ntfs: (device loop1): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 783.871602] ntfs: (device loop1): ntfs_fill_super(): Not an NTFS volume. 21:47:56 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800740000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:56 executing program 5: execve(0x0, &(0x7f0000000300)=[&(0x7f00000001c0)='\x00'], 0x0) 21:47:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800006800000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:56 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000000)=@in={0x10, 0x2}, 0x10) 21:47:56 executing program 3: pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x0) accept$inet6(r0, &(0x7f0000000240), &(0x7f00000002c0)=0x1c) 21:47:56 executing program 2: pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) listen(r0, 0x0) 21:47:56 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fchown(r0, 0x0, 0x0) 21:47:56 executing program 0: symlinkat(&(0x7f0000000000)='\x00', 0xffffffffffffff9c, &(0x7f0000002500)='./file0\x00') unlinkat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 21:47:56 executing program 5: open$dir(&(0x7f00000000c0)='./file0/../file0\x00', 0x200, 0x0) [ 784.032412] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 21:47:56 executing program 3: r0 = socket$inet6(0x1c, 0x3, 0x0) fcntl$lock(r0, 0xc, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) 21:47:56 executing program 0: r0 = openat$ptmx(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) flock(r0, 0x8) 21:47:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800006c00000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:56 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e54465320202020000208007a0000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:56 executing program 0: syz_emit_ethernet(0x46, &(0x7f0000000040)={@random="d7da6ffb2480", @local, @val, {@ipv6}}, 0x0) 21:47:56 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) execveat(r0, &(0x7f0000002ec0)='./file0\x00', 0x0, 0x0, 0x0) 21:47:56 executing program 3: timer_create(0x7, &(0x7f0000000200)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f00000006c0)) 21:47:56 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) faccessat(r0, &(0x7f0000000400)='./file0\x00', 0x0) 21:47:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800007400000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:57 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) write$FUSE_LK(r0, 0xffffffffffffffff, 0x0) 21:47:57 executing program 0: execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x0) 21:47:57 executing program 5: r0 = semget$private(0x0, 0x3, 0x0) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000000)=""/68) 21:47:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x29, 0x1600bd74, 0x0, 0x700) 21:47:57 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = msgget$private(0x0, 0x0) msgsnd(r2, &(0x7f0000000500)=ANY=[], 0x3f9, 0x0) msgsnd(r2, &(0x7f0000000040)=ANY=[], 0x8, 0x0) msgrcv(r2, 0x0, 0x0, 0x0, 0x1000) msgctl$IPC_RMID(r2, 0x0) 21:47:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800007a00000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:57 executing program 5: timer_create(0x0, 0x0, &(0x7f0000003f00)=0x0) timer_settime(r0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) 21:47:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mincore(&(0x7f00000b3000/0x4000)=nil, 0x4000, &(0x7f0000000240)=""/241) 21:47:57 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r0, 0x0, 0x3a) 21:47:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800038500000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:57 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020803870000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:57 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) 21:47:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000005bc0)={0x0, 0x6}, 0x8) recvfrom(r0, &(0x7f0000000040)=""/103, 0x67, 0x0, 0x0, 0x0) 21:47:57 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x29, 0x33, 0x0, 0x0) 21:47:57 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0xb, &(0x7f0000000100)="84", 0x1) 21:47:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800038700000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:57 executing program 3: add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 21:47:57 executing program 3: r0 = epoll_create(0x7ff9) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x100, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 21:47:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0x6cc, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x0, 0x0, "3311ad225118a5477fb07c9051c8962b4e05c34acf3a6f6f7be827d423f52b353f6c86d77f1b343818d50f64d02056cb6746e83451160dcb1d7478825e4ed546e6d7f97d1b3e7f963d950b0fe9d6e80a"}, 0xd8) 21:47:57 executing program 2: prctl$PR_SET_SECCOMP(0x39, 0x0, &(0x7f0000000040)={0x0, 0x0}) 21:47:57 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@text16={0x10, &(0x7f00000000c0)="0f20e06635000004000f22e06766c7442400007000006766c7442402050000006766c744240600000000670f0114240f01c8e38336f08301dc660f38816bad0f01d566b9ae0b000066b80000000066ba000000800f30d9ed260f01c9", 0x5c}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) ioctl$sock_inet_tcp_SIOCINQ(r5, 0x541b, &(0x7f00000000c0)) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000049000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_DEBUGREGS(r4, 0x4080aea2, &(0x7f0000000200)={[], 0x0, 0x24}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) shmat(0x0, &(0x7f0000000000/0x13000)=nil, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)={0x3, 0x200}) 21:47:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020800038800000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c453000030000000000000000000100010038000100980100000004", 0x1e, 0x4000}], 0x0, &(0x7f000007dc00)) 21:47:57 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb52904e5446532020202000020803880000000000f8000000000000000000000000000080008000ff0f0000000000000400000000000000ff00000000000000f600000001", 0x45}, {&(0x7f0000010300)="46494c45300003000000000000000000010001003800010098010000000400000000000000000000040000000000000008", 0x31, 0x4000}], 0x0, &(0x7f000007dc00)) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 21:47:57 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0xffffc90000000000, 0x0, 0x0) SeaBIOS (version 1.8.2-google) Total RAM Size = 0x0000000200000000 = 8192 MiB CPUs found: 2 Max CPUs supported: 2 SeaBIOS (version 1.8.2-google) Machine UUID 04bdee6e-5bfa-e216-8eba-8e3292e95007 found virtio-scsi at 0:3 virtio-scsi vendor='Google' product='PersistentDisk' rev='1' type=0 removable=0 virtio-scsi blksize=512 sectors=4194304 = 2048 MiB drive 0x000f2400: PCHS=0/0/0 translation=lba LCHS=520/128/63 s=4194304 Sending Seabios boot VM event. Booting from Hard Disk 0... early console in extract_kernel input_data: 0x000000000a2232e9 input_len: 0x0000000003bdeca4 output: 0x0000000001000000 output_len: 0x000000000ba3bb28 kernel_total_size: 0x000000000ce26000 trampoline_32bit: 0x000000000009d000 Decompressing Linux... Parsing ELF... done. Booting the kernel. [ 0.000000] Linux version 4.19.190-syzkaller (syzkaller@syzkaller) (gcc version 10.2.1 20210110 (Debian 10.2.1-6)) #0 SMP PREEMPT now [ 0.000000] Command line: BOOT_IMAGE=/vmlinuz root=/dev/sda1 console=ttyS0 earlyprintk=serial vsyscall=native net.ifnames=0 sysctl.kernel.hung_task_all_cpu_backtrace=1 [ 0.000000] KERNEL supported cpus: [ 0.000000] Intel GenuineIntel [ 0.000000] AMD AuthenticAMD [ 0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' [ 0.000000] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 [ 0.000000] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. [ 0.000000] BIOS-provided physical RAM map: [ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable [ 0.000000] BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000bfffcfff] usable [ 0.000000] BIOS-e820: [mem 0x00000000bfffd000-0x00000000bfffffff] reserved [ 0.000000] BIOS-e820: [mem 0x00000000fffbc000-0x00000000ffffffff] reserved [ 0.000000] BIOS-e820: [mem 0x0000000100000000-0x000000023fffffff] usable [ 0.000000] bootconsole [earlyser0] enabled [ 0.000000] ERROR: earlyprintk= earlyser already used [ 0.000000] ERROR: earlyprintk= earlyser already used [ 0.000000] nopcid: PCID feature disabled [ 0.000000] Malformed early option 'vsyscall' [ 0.000000] NX (Execute Disable) protection: active [ 0.000000] SMBIOS 2.4 present. [ 0.000000] DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 0.000000] Hypervisor detected: KVM [ 0.000000] kvm-clock: Using msrs 4b564d01 and 4b564d00 [ 0.000003] kvm-clock: cpu 0, msr c663001, primary cpu clock [ 0.000003] kvm-clock: using sched offset of 4075699254 cycles [ 0.001022] clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns [ 0.004633] tsc: Detected 2300.000 MHz processor [ 0.009370] last_pfn = 0x240000 max_arch_pfn = 0x400000000 [ 0.010498] x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT [ 0.012397] last_pfn = 0xbfffd max_arch_pfn = 0x400000000 [ 0.018938] found SMP MP-table at [mem 0x000f26c0-0x000f26cf] [ 0.020533] Using GB pages for direct mapping [ 0.023132] ACPI: Early table checksum verification disabled [ 0.024556] ACPI: RSDP 0x00000000000F2440 000014 (v00 Google) [ 0.028056] ACPI: RSDT 0x00000000BFFFFFA0 000038 (v01 Google GOOGRSDT 00000001 GOOG 00000001) [ 0.029481] ACPI: FACP 0x00000000BFFFF340 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) [ 0.032600] ACPI: DSDT 0x00000000BFFFDA80 0018BA (v01 Google GOOGDSDT 00000001 GOOG 00000001) [ 0.034309] ACPI: FACS 0x00000000BFFFDA40 000040 [ 0.034987] ACPI: FACS 0x00000000BFFFDA40 000040 [ 0.035769] ACPI: SRAT 0x00000000BFFFFE70 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) [ 0.037857] ACPI: APIC 0x00000000BFFFFDC0 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) [ 0.039597] ACPI: SSDT 0x00000000BFFFF440 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) [ 0.041106] ACPI: WAET 0x00000000BFFFFE40 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) [ 0.042575] ACPI: Reserving FACP table memory at [mem 0xbffff340-0xbffff433] [ 0.044105] ACPI: Reserving DSDT table memory at [mem 0xbfffda80-0xbffff339] [ 0.045496] ACPI: Reserving FACS table memory at [mem 0xbfffda40-0xbfffda7f] [ 0.046902] ACPI: Reserving FACS table memory at [mem 0xbfffda40-0xbfffda7f] [ 0.048219] ACPI: Reserving SRAT table memory at [mem 0xbffffe70-0xbfffff37] [ 0.049542] ACPI: Reserving APIC table memory at [mem 0xbffffdc0-0xbffffe35] [ 0.050712] ACPI: Reserving SSDT table memory at [mem 0xbffff440-0xbffffdbf] [ 0.052583] ACPI: Reserving WAET table memory at [mem 0xbffffe40-0xbffffe67] [ 0.055132] SRAT: PXM 0 -> APIC 0x00 -> Node 0 [ 0.056486] SRAT: PXM 0 -> APIC 0x01 -> Node 0 [ 0.057334] ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] [ 0.058354] ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] [ 0.059397] ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x23fffffff] [ 0.060529] NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] [ 0.062802] NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x23fffffff] -> [mem 0x00000000-0x23fffffff] [ 0.065579] Faking node 0 at [mem 0x0000000000000000-0x000000013fffffff] (5120MB) [ 0.067073] Faking node 1 at [mem 0x0000000140000000-0x000000023fffffff] (4096MB) [ 0.068738] NODE_DATA(0) allocated [mem 0x13fffb000-0x13fffffff] [ 0.070600] NODE_DATA(1) allocated [mem 0x23fff8000-0x23fffcfff] [ 0.126609] Zone ranges: [ 0.127355] DMA [mem 0x0000000000001000-0x0000000000ffffff] [ 0.128808] DMA32 [mem 0x0000000001000000-0x00000000ffffffff] [ 0.130314] Normal [mem 0x0000000100000000-0x000000023fffffff] [ 0.131879] Device empty [ 0.132362] Movable zone start for each node [ 0.133045] Early memory node ranges [ 0.133672] node 0: [mem 0x0000000000001000-0x000000000009efff] [ 0.134862] node 0: [mem 0x0000000000100000-0x00000000bfffcfff] [ 0.136277] node 0: [mem 0x0000000100000000-0x000000013fffffff] [ 0.137723] node 1: [mem 0x0000000140000000-0x000000023fffffff] [ 0.138778] Zeroed struct page in unavailable ranges: 101 pages [ 0.138784] Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] [ 0.197577] Initmem setup node 1 [mem 0x0000000140000000-0x000000023fffffff] [ 0.674742] kasan: KernelAddressSanitizer initialized [ 0.676684] ACPI: PM-Timer IO Port: 0xb008 [ 0.677791] ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) [ 0.679969] IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 [ 0.681216] ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) [ 0.682231] ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) [ 0.683669] ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) [ 0.684898] ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) [ 0.686694] Using ACPI (MADT) for SMP configuration information [ 0.687885] smpboot: Allowing 2 CPUs, 0 hotplug CPUs [ 0.689225] PM: Registered nosave memory: [mem 0x00000000-0x00000fff] [ 0.690436] PM: Registered nosave memory: [mem 0x0009f000-0x0009ffff] [ 0.691830] PM: Registered nosave memory: [mem 0x000a0000-0x000effff] [ 0.693418] PM: Registered nosave memory: [mem 0x000f0000-0x000fffff] [ 0.694542] PM: Registered nosave memory: [mem 0xbfffd000-0xbfffffff] [ 0.695735] PM: Registered nosave memory: [mem 0xc0000000-0xfffbbfff] [ 0.698290] PM: Registered nosave memory: [mem 0xfffbc000-0xffffffff] [ 0.699270] [mem 0xc0000000-0xfffbbfff] available for PCI devices [ 0.700389] Booting paravirtualized kernel on KVM [ 0.701020] clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns [ 2.193852] random: get_random_bytes called from start_kernel+0x10b/0x911 with crng_init=0 [ 2.195754] setup_percpu: NR_CPUS:8 nr_cpumask_bits:8 nr_cpu_ids:2 nr_node_ids:2 [ 2.198232] percpu: Embedded 54 pages/cpu s182664 r8192 d30328 u1048576 [ 2.199634] kvm-stealtime: cpu 0, msr ba01e400 [ 2.200324] PV qspinlock hash table entries: 256 (order: 0, 4096 bytes) [ 2.201432] Built 2 zonelists, mobility grouping on. Total pages: 2064262 [ 2.202381] Policy zone: Normal [ 2.202853] Kernel command line: earlyprintk=serial oops=panic panic_on_warn=1 nmi_watchdog=panic panic=86400 net.ifnames=0 sysctl.kernel.hung_task_all_cpu_backtrace=1 ima_policy=tcb watchdog_thresh=55 workqueue.watchdog_thresh=140 kvm-intel.nested=1 nf-conntrack-ftp.ports=20000 nf-conntrack-tftp.ports=20000 nf-conntrack-sip.ports=20000 nf-conntrack-irc.ports=20000 nf-conntrack-sane.ports=20000 vivid.n_devs=16 vivid.multiplanar=1,2,1,2,1,2,1,2,1,2,1,2,1,2,1,2 netrom.nr_ndevs=16 rose.rose_ndevs=16 spec_store_bypass_disable=prctl numa=fake=2 nopcid dummy_hcd.num=8 binder.debug_mask=0 rcupdate.rcu_expedited=1 BOOT_IMAGE=/vmlinuz root=/dev/sda1 console=ttyS0 earlyprintk=serial vsyscall=native net.ifnames=0 sysctl.kernel.hung_task_all_cpu_backtrace=1 [ 2.938886] Memory: 6904308K/8388204K available (118812K kernel code, 21046K rwdata, 24216K rodata, 2916K init, 24340K bss, 1483896K reserved, 0K cma-reserved) [ 2.944227] Running RCU self tests [ 2.944766] rcu: Preemptible hierarchical RCU implementation. [ 2.946984] rcu: RCU lockdep checking is enabled. [ 2.949043] rcu: RCU restricting CPUs from NR_CPUS=8 to nr_cpu_ids=2. [ 2.950481] rcu: RCU callback double-/use-after-free debug enabled. [ 2.951558] rcu: RCU debug extended QS entry/exit. [ 2.952468] All grace periods are expedited (rcu_expedited). [ 2.953452] Tasks RCU enabled. [ 2.953974] rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 [ 2.963086] NR_IRQS: 4352, nr_irqs: 440, preallocated irqs: 16 [ 2.967722] Console: colour VGA+ 80x25 [ 2.968480] console [ttyS0] enabled [ 2.968480] console [ttyS0] enabled [ 2.971290] bootconsole [earlyser0] disabled [ 2.971290] bootconsole [earlyser0] disabled [ 2.973749] Lock dependency validator: Copyright (c) 2006 Red Hat, Inc., Ingo Molnar [ 2.975402] ... MAX_LOCKDEP_SUBCLASSES: 8 [ 2.976671] ... MAX_LOCK_DEPTH: 48 [ 2.977733] ... MAX_LOCKDEP_KEYS: 8191 [ 2.979405] ... CLASSHASH_SIZE: 4096 [ 2.980594] ... MAX_LOCKDEP_ENTRIES: 32768 [ 2.981951] ... MAX_LOCKDEP_CHAINS: 65536 [ 2.983707] ... CHAINHASH_SIZE: 32768 [ 2.985356] memory used by lock dependency info: 7391 kB [ 2.986695] per task-struct memory footprint: 1920 bytes [ 2.990940] mempolicy: Enabling automatic NUMA balancing. Configure with numa_balancing= or the kernel.numa_balancing sysctl [ 2.993901] ACPI: Core revision 20180810 [ 2.996014] APIC: Switch to symmetric I/O mode setup [ 3.001998] ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 [ 3.003655] clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212735223b2, max_idle_ns: 440795277976 ns [ 3.005668] Calibrating delay loop (skipped) preset value.. 4600.00 BogoMIPS (lpj=23000000) [ 3.015707] pid_max: default: 32768 minimum: 301 [ 3.017532] Security Framework initialized [ 3.018737] Yama: becoming mindful. [ 3.019920] AppArmor: AppArmor initialized [ 3.028602] Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes) [ 3.033703] Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes) [ 3.035800] Mount-cache hash table entries: 16384 (order: 5, 131072 bytes) [ 3.037579] Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes) [ 3.043420] Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 [ 3.044847] Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 [ 3.045663] Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization [ 3.047382] Spectre V2 : Spectre mitigation: kernel not compiled with retpoline; no mitigation available! [ 3.047416] Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl [ 3.051603] MDS: Mitigation: Clear CPU buffers [ 3.054375] Freeing SMP alternatives memory: 96K [ 3.179877] smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) [ 3.183335] Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. [ 3.185486] rcu: Hierarchical SRCU implementation. [ 3.189834] NMI watchdog: Perf NMI watchdog permanently disabled [ 3.191659] smp: Bringing up secondary CPUs ... [ 3.195861] x86: Booting SMP configuration: [ 3.197010] .... node #0, CPUs: #1 [ 0.050188] kvm-clock: cpu 1, msr c663041, secondary cpu clock [ 3.200655] kvm-stealtime: cpu 1, msr ba11e400 [ 3.200655] MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. [ 3.205719] smp: Brought up 2 nodes, 2 CPUs [ 3.206544] smpboot: Max logical packages: 1 [ 3.208122] smpboot: Total of 2 processors activated (9200.00 BogoMIPS) [ 3.212308] devtmpfs: initialized [ 3.212308] x86/mm: Memory block size: 128MB [ 3.246729] kworker/u4:0 (24) used greatest stack depth: 27280 bytes left [ 3.246729] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns [ 3.247557] futex hash table entries: 512 (order: 4, 65536 bytes) [ 3.249356] xor: automatically using best checksumming function avx [ 3.257421] RTC time: 21:48:05, date: 05/14/21 [ 3.265691] NET: Registered protocol family 16 [ 3.267515] audit: initializing netlink subsys (disabled) [ 3.268614] audit: type=2000 audit(1621028885.247:1): state=initialized audit_enabled=0 res=1 [ 3.277341] cpuidle: using governor menu [ 3.283416] ACPI: bus type PCI registered [ 3.286335] PCI: Using configuration type 1 for base access [ 3.731974] kworker/u4:4 (1329) used greatest stack depth: 26928 bytes left [ 3.809503] WARNING: workqueue cpumask: online intersect > possible intersect [ 3.816573] HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages [ 3.817840] HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages [ 3.822327] cryptd: max_cpu_qlen set to 1000 [ 3.995711] raid6: sse2x1 gen() 2371 MB/s [ 4.165671] raid6: sse2x1 xor() 1190 MB/s [ 4.335670] raid6: sse2x2 gen() 4172 MB/s [ 4.500683] raid6: sse2x2 xor() 2214 MB/s [ 4.670681] raid6: sse2x4 gen() 6221 MB/s [ 4.840677] raid6: sse2x4 xor() 3654 MB/s [ 5.010687] raid6: avx2x1 gen() 4959 MB/s [ 5.185679] raid6: avx2x1 xor() 2375 MB/s [ 5.350683] raid6: avx2x2 gen() 8267 MB/s [ 5.520684] raid6: avx2x2 xor() 4400 MB/s [ 5.690682] raid6: avx2x4 gen() 12725 MB/s [ 5.860674] raid6: avx2x4 xor() 7256 MB/s [ 5.862028] raid6: using algorithm avx2x4 gen() 12725 MB/s [ 5.863524] raid6: .... xor() 7256 MB/s, rmw enabled [ 5.864394] raid6: using avx2x2 recovery algorithm [ 5.866683] ACPI: Added _OSI(Module Device) [ 5.867946] ACPI: Added _OSI(Processor Device) [ 5.869051] ACPI: Added _OSI(3.0 _SCP Extensions) [ 5.870116] ACPI: Added _OSI(Processor Aggregator Device) [ 5.871067] ACPI: Added _OSI(Linux-Dell-Video) [ 5.872538] ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) [ 5.935881] ACPI: 2 ACPI AML tables successfully acquired and loaded [ 5.959659] ACPI: Interpreter enabled [ 5.960826] ACPI: (supports S0 S3 S4 S5) [ 5.961913] ACPI: Using IOAPIC for interrupt routing [ 5.965718] PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug [ 5.967699] ACPI: Enabled 16 GPEs in block 00 to 0F [ 6.063053] ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) [ 6.064851] acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI] [ 6.065869] acpi PNP0A03:00: _OSC failed (AE_NOT_FOUND); disabling ASPM [ 6.067446] acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. [ 6.077229] PCI host bridge to bus 0000:00 [ 6.078243] pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] [ 6.080009] pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] [ 6.081380] pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] [ 6.083016] pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] [ 6.084529] pci_bus 0000:00: root bus resource [bus 00-ff] [ 6.135843] pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI [ 6.327129] ACPI: PCI Interrupt Link [LNKA] (IRQs 5 *10 11) [ 6.335701] ACPI: PCI Interrupt Link [LNKB] (IRQs 5 *10 11) [ 6.337504] ACPI: PCI Interrupt Link [LNKC] (IRQs 5 10 *11) [ 6.342397] ACPI: PCI Interrupt Link [LNKD] (IRQs 5 10 *11) [ 6.346115] ACPI: PCI Interrupt Link [LNKS] (IRQs *9) [ 6.358704] pci 0000:00:05.0: vgaarb: setting as boot VGA device [ 6.359572] pci 0000:00:05.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none [ 6.359750] pci 0000:00:05.0: vgaarb: bridge control possible [ 6.361172] vgaarb: loaded [ 6.367869] SCSI subsystem initialized [ 6.367869] ACPI: bus type USB registered [ 6.376068] usbcore: registered new interface driver usbfs [ 6.376068] usbcore: registered new interface driver hub [ 6.376068] usbcore: registered new device driver usb [ 6.377382] media: Linux media interface: v0.10 [ 6.378449] videodev: Linux video capture interface: v2.00 [ 6.388190] pps_core: LinuxPPS API ver. 1 registered [ 6.389155] pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti [ 6.389180] PTP clock support registered [ 6.389180] EDAC MC: Ver: 3.0.0 [ 6.397316] Advanced Linux Sound Architecture Driver Initialized. [ 6.398902] PCI: Using ACPI for IRQ routing [ 6.406618] Bluetooth: Core ver 2.22 [ 6.406892] NET: Registered protocol family 31 [ 6.406892] Bluetooth: HCI device and connection manager initialized [ 6.406892] Bluetooth: HCI socket layer initialized [ 6.406892] Bluetooth: L2CAP socket layer initialized [ 6.408054] Bluetooth: SCO socket layer initialized [ 6.409030] NET: Registered protocol family 8 [ 6.410041] NET: Registered protocol family 20 [ 6.415649] NetLabel: Initializing [ 6.416933] NetLabel: domain hash size = 128 [ 6.416933] NetLabel: protocols = UNLABELED CIPSOv4 CALIPSO [ 6.416933] NetLabel: unlabeled traffic allowed by default [ 6.418521] nfc: nfc_init: NFC Core ver 0.1 [ 6.420000] NET: Registered protocol family 39 [ 6.427611] clocksource: Switched to clocksource kvm-clock [ 6.925259] VFS: Disk quotas dquot_6.6.0 [ 6.926697] VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) [ 6.930231] FS-Cache: Loaded [ 6.933046] CacheFiles: Loaded [ 6.936067] AppArmor: AppArmor Filesystem Enabled [ 6.937457] pnp: PnP ACPI init [ 6.951242] pnp: PnP ACPI: found 7 devices [ 7.000195] clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns [ 7.004276] NET: Registered protocol family 2 [ 7.009309] tcp_listen_portaddr_hash hash table entries: 4096 (order: 6, 294912 bytes) [ 7.011598] TCP established hash table entries: 65536 (order: 7, 524288 bytes) [ 7.015496] TCP bind hash table entries: 65536 (order: 10, 4194304 bytes) [ 7.021263] TCP: Hash tables configured (established 65536 bind 65536) [ 7.023833] UDP hash table entries: 4096 (order: 7, 655360 bytes) [ 7.027329] UDP-Lite hash table entries: 4096 (order: 7, 655360 bytes) [ 7.031205] NET: Registered protocol family 1 [ 7.034098] RPC: Registered named UNIX socket transport module. [ 7.036653] RPC: Registered udp transport module. [ 7.038188] RPC: Registered tcp transport module. [ 7.038950] RPC: Registered tcp NFSv4.1 backchannel transport module. [ 7.041763] NET: Registered protocol family 44 [ 7.043052] pci 0000:00:00.0: Limiting direct PCI/PCI transfers [ 7.044423] pci 0000:00:05.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] [ 7.046938] PCI-DMA: Using software bounce buffering for IO (SWIOTLB) [ 7.048178] software IO TLB: mapped [mem 0xb6000000-0xba000000] (64MB) [ 7.052606] RAPL PMU: API unit is 2^-32 Joules, 3 fixed counters, 10737418240 ms ovfl timer [ 7.054895] RAPL PMU: hw unit of domain pp0-core 2^-0 Joules [ 7.056173] RAPL PMU: hw unit of domain package 2^-0 Joules [ 7.057334] RAPL PMU: hw unit of domain dram 2^-16 Joules [ 7.060762] kvm: already loaded the other module [ 7.061889] clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212735223b2, max_idle_ns: 440795277976 ns [ 7.106868] Initialise system trusted keyrings [ 7.109087] workingset: timestamp_bits=40 max_order=21 bucket_order=0 [ 7.110913] zbud: loaded [ 7.118116] DLM installed [ 7.120454] squashfs: version 4.0 (2009/01/31) Phillip Lougher [ 7.124281] FS-Cache: Netfs 'nfs' registered for caching [ 7.127375] NFS: Registering the id_resolver key type [ 7.128763] Key type id_resolver registered [ 7.129975] Key type id_legacy registered [ 7.131023] nfs4filelayout_init: NFSv4 File Layout Driver Registering... [ 7.133016] nfs4flexfilelayout_init: NFSv4 Flexfile Layout Driver Registering... [ 7.134798] Installing knfsd (copyright (C) 1996 okir@monad.swb.de). [ 7.139487] FS-Cache: Netfs 'cifs' registered for caching [ 7.142131] Key type cifs.spnego registered [ 7.143479] ntfs: driver 2.1.32 [Flags: R/W]. [ 7.146621] efs: 1.0a - http://aeschi.ch.eu.org/efs/ [ 7.149108] jffs2: version 2.2. (NAND) (SUMMARY) © 2001-2006 Red Hat, Inc. [ 7.152703] romfs: ROMFS MTD (C) 2007 Red Hat, Inc. [ 7.153787] QNX4 filesystem 0.2.3 registered. [ 7.155025] qnx6: QNX6 filesystem 1.0.0 registered. [ 7.156677] fuse init (API version 7.27) [ 7.159841] orangefs_debugfs_init: called with debug mask: :none: :0: [ 7.161691] orangefs_init: module version upstream loaded [ 7.163036] JFS: nTxBlock = 8192, nTxLock = 65536 [ 7.172387] SGI XFS with ACLs, security attributes, realtime, no debug enabled [ 7.178041] 9p: Installing v9fs 9p2000 file system support [ 7.180167] FS-Cache: Netfs '9p' registered for caching [ 7.182215] NILFS version 2 loaded [ 7.183051] befs: version: 0.9.3 [ 7.186149] ocfs2: Registered cluster interface o2cb [ 7.187648] ocfs2: Registered cluster interface user [ 7.188970] OCFS2 User DLM kernel interface loaded [ 7.198131] gfs2: GFS2 installed [ 7.203112] FS-Cache: Netfs 'ceph' registered for caching [ 7.204506] ceph: loaded (mds proto 32) [ 7.237043] NET: Registered protocol family 38 [ 7.239666] async_tx: api initialized (async) [ 7.241011] Key type asymmetric registered [ 7.241808] Asymmetric key parser 'x509' registered [ 7.242949] Key type pkcs7_test registered [ 7.244143] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 241) [ 7.246610] io scheduler noop registered [ 7.247596] io scheduler deadline registered [ 7.249022] io scheduler cfq registered (default) [ 7.250076] io scheduler mq-deadline registered [ 7.251086] io scheduler kyber registered [ 7.252197] io scheduler bfq registered [ 7.260200] usbcore: registered new interface driver udlfb [ 7.261469] usbcore: registered new interface driver smscufx [ 7.265181] uvesafb: failed to execute /sbin/v86d [ 7.267980] uvesafb: make sure that the v86d helper is installed and executable [ 7.269835] uvesafb: Getting VBE info block failed (eax=0x4f00, err=-2) [ 7.271370] uvesafb: vbe_init() failed with -22 [ 7.272294] uvesafb: probe of uvesafb.0 failed with error -22 [ 7.274336] vga16fb: mapped to 0x000000003a0b1d39 [ 7.339500] Console: switching to colour frame buffer device 80x30 [ 7.613523] fb0: VGA16 VGA frame buffer device [ 7.616423] input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input0 [ 7.618421] ACPI: Power Button [PWRF] [ 7.620752] input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input1 [ 7.622624] ACPI: Sleep Button [SLPF] [ 7.642520] PCI Interrupt Link [LNKC] enabled at IRQ 11 [ 7.644186] virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver [ 7.663414] PCI Interrupt Link [LNKD] enabled at IRQ 10 [ 7.665487] virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver [ 7.685612] PCI Interrupt Link [LNKB] enabled at IRQ 10 [ 7.687714] virtio-pci 0000:00:06.0: virtio_pci: leaving for legacy driver [ 7.701925] virtio-pci 0000:00:07.0: virtio_pci: leaving for legacy driver [ 7.990723] HDLC line discipline maxframe=4096 [ 7.992650] N_HDLC line discipline registered. [ 7.993752] Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled [ 8.017861] 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A [ 8.044912] 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A [ 8.071278] 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A [ 8.098042] 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A [ 8.103727] Cyclades driver 2.6 [ 8.105179] Initializing Nozomi driver 2.1d [ 8.106455] RocketPort device driver module, version 2.09, 12-June-2003 [ 8.107914] No rocketport ports found; unloading driver [ 8.112445] Non-volatile memory driver v1.3 [ 8.129024] Linux agpgart interface v0.103 [ 8.130191] random: fast init done [ 8.132626] random: crng init done [ 8.137210] [drm] Initialized vgem 1.0.0 20120112 for vgem on minor 0 [ 8.139605] [drm] Supports vblank timestamp caching Rev 2 (21.10.2013). [ 8.141599] [drm] Driver supports precise vblank timestamp query. [ 8.146016] [drm] Initialized vkms 1.0.0 20180514 for virtual device on minor 1 [ 8.148552] usbcore: registered new interface driver udl [ 8.197272] brd: module loaded [ 8.257891] loop: module loaded [ 8.321102] zram: Added device: zram0 [ 8.328744] null: module loaded [ 8.329961] Guest personality initialized and is inactive [ 8.331833] VMCI host device registered (name=vmci, major=10, minor=55) [ 8.333379] Initialized host personality [ 8.334576] usbcore: registered new interface driver rtsx_usb [ 8.338311] usbcore: registered new interface driver viperboard [ 8.340580] usbcore: registered new interface driver dln2 [ 8.342737] usbcore: registered new interface driver pn533_usb [ 8.347824] nfcsim 0.2 initialized [ 8.349083] usbcore: registered new interface driver port100 [ 8.350609] usbcore: registered new interface driver nfcmrvl [ 8.353236] Loading iSCSI transport class v2.0-870. [ 8.379237] scsi host0: Virtio SCSI HBA [ 8.446601] st: Version 20160209, fixed bufsize 32768, s/g segs 256 [ 8.462289] scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 [ 8.469094] Rounding down aligned max_sectors from 4294967295 to 4294967288 [ 8.471981] db_root: cannot open: /etc/target [ 8.473980] slram: not enough parameters. [ 8.478847] ftl_cs: FTL header not found. [ 8.488032] Ethernet Channel Bonding Driver: v3.7.1 (April 27, 2011) [ 8.516761] eql: Equalizer2002: Simon Janes (simon@ncm.com) and David S. Miller (davem@redhat.com) [ 8.528526] MACsec IEEE 802.1AE [ 8.531900] libphy: Fixed MDIO Bus: probed [ 8.536772] tun: Universal TUN/TAP device driver, 1.6 [ 8.588614] vcan: Virtual CAN interface driver [ 8.589808] vxcan: Virtual CAN Tunnel driver [ 8.591019] slcan: serial line CAN interface driver [ 8.592276] slcan: 10 dynamic interface channels. [ 8.593618] CAN device driver interface [ 8.595255] usbcore: registered new interface driver usb_8dev [ 8.597318] usbcore: registered new interface driver ems_usb [ 8.599106] usbcore: registered new interface driver esd_usb2 [ 8.600837] usbcore: registered new interface driver gs_usb [ 8.603411] usbcore: registered new interface driver kvaser_usb [ 8.605507] usbcore: registered new interface driver mcba_usb [ 8.607606] usbcore: registered new interface driver peak_usb [ 8.609578] e100: Intel(R) PRO/100 Network Driver, 3.5.24-k2-NAPI [ 8.611129] e100: Copyright(c) 1999-2006 Intel Corporation [ 8.613130] e1000: Intel(R) PRO/1000 Network Driver - version 7.3.21-k8-NAPI [ 8.614773] e1000: Copyright (c) 1999-2006 Intel Corporation. [ 8.617010] e1000e: Intel(R) PRO/1000 Network Driver - 3.2.6-k [ 8.618838] e1000e: Copyright(c) 1999 - 2015 Intel Corporation. [ 8.621971] mkiss: AX.25 Multikiss, Hans Albas PE1AYX [ 8.623452] AX.25: 6pack driver, Revision: 0.3.0 [ 8.624693] AX.25: bpqether driver version 004 [ 8.626578] PPP generic driver version 2.4.2 [ 8.628859] PPP BSD Compression module registered [ 8.630263] PPP Deflate Compression module registered [ 8.631659] PPP MPPE Compression module registered [ 8.632888] NET: Registered protocol family 24 [ 8.634101] PPTP driver version 0.8.5 [ 8.635605] SLIP: version 0.8.4-NET3.019-NEWTTY (dynamic channels, max=256) (6 bit encapsulation enabled). [ 8.638276] CSLIP: code copyright 1989 Regents of the University of California. [ 8.640009] SLIP linefill/keepalive option. [ 8.640996] hdlc: HDLC support module revision 1.22 [ 8.642888] x25_asy: X.25 async: version 0.00 ALPHA (dynamic channels, max=256) [ 8.644673] DLCI driver v0.35, 4 Jan 1997, mike.mclagan@linux.org. [ 8.646314] LAPB Ethernet driver version 0.02 [ 8.649197] usbcore: registered new interface driver ath9k_htc [ 8.651160] usbcore: registered new interface driver carl9170 [ 8.653033] usbcore: registered new interface driver ath6kl_usb [ 8.655344] usbcore: registered new interface driver ar5523 [ 8.658462] usbcore: registered new interface driver ath10k_usb [ 8.660432] usbcore: registered new interface driver rndis_wlan [ 8.663311] mac80211_hwsim: initializing netlink [ 8.694546] usbcore: registered new interface driver i2400m_usb [ 8.697193] fakelb driver is marked as deprecated, please use mac802154_hwsim! [ 8.710559] ieee802154fakelb ieee802154fakelb: added 2 fake ieee802154 hardware devices [ 8.713081] usbcore: registered new interface driver atusb [ 8.727790] mac802154_hwsim mac802154_hwsim: Added 2 mac802154 hwsim hardware radios [ 8.729990] VMware vmxnet3 virtual NIC driver - version 1.4.16.0-k-NAPI [ 8.732763] usbcore: registered new interface driver catc [ 8.734445] usbcore: registered new interface driver kaweth [ 8.736356] pegasus: v0.9.3 (2013/04/25), Pegasus/Pegasus II USB Ethernet driver [ 8.738420] usbcore: registered new interface driver pegasus [ 8.740151] usbcore: registered new interface driver rtl8150 [ 8.741865] usbcore: registered new interface driver r8152 [ 8.743320] hso: drivers/net/usb/hso.c: Option Wireless [ 8.745159] usbcore: registered new interface driver hso [ 8.747921] usbcore: registered new interface driver lan78xx [ 8.750438] usbcore: registered new interface driver asix [ 8.752030] usbcore: registered new interface driver ax88179_178a [ 8.753711] usbcore: registered new interface driver cdc_ether [ 8.755469] usbcore: registered new interface driver cdc_eem [ 8.758194] usbcore: registered new interface driver dm9601 [ 8.760011] usbcore: registered new interface driver sr9700 [ 8.761589] usbcore: registered new interface driver CoreChips [ 8.763266] usbcore: registered new interface driver smsc75xx [ 8.764989] usbcore: registered new interface driver smsc95xx [ 8.767415] usbcore: registered new interface driver gl620a [ 8.768924] usbcore: registered new interface driver net1080 [ 8.770456] usbcore: registered new interface driver plusb [ 8.772252] usbcore: registered new interface driver rndis_host [ 8.774178] usbcore: registered new interface driver cdc_subset [ 8.776613] usbcore: registered new interface driver zaurus [ 8.778253] usbcore: registered new interface driver MOSCHIP usb-ethernet driver [ 8.780223] usbcore: registered new interface driver int51x1 [ 8.781741] usbcore: registered new interface driver cdc_phonet [ 8.783438] usbcore: registered new interface driver kalmia [ 8.785218] usbcore: registered new interface driver ipheth [ 8.787652] usbcore: registered new interface driver sierra_net [ 8.789338] usbcore: registered new interface driver cx82310_eth [ 8.791031] usbcore: registered new interface driver cdc_ncm [ 8.792679] usbcore: registered new interface driver huawei_cdc_ncm [ 8.794409] usbcore: registered new interface driver lg-vl600 [ 8.797229] usbcore: registered new interface driver qmi_wwan [ 8.798945] usbcore: registered new interface driver cdc_mbim [ 8.800606] usbcore: registered new interface driver ch9200 [ 8.806204] VFIO - User Level meta-driver version: 0.3 [ 8.814933] aoe: AoE v85 initialised. [ 8.821732] ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver [ 8.823571] ehci-pci: EHCI PCI platform driver [ 8.824935] ehci-platform: EHCI generic platform driver [ 8.827611] ohci_hcd: USB 1.1 'Open' Host Controller (OHCI) Driver [ 8.829387] ohci-pci: OHCI PCI platform driver [ 8.831034] ohci-platform: OHCI generic platform driver [ 8.833519] uhci_hcd: USB Universal Host Controller Interface driver [ 8.838169] driver u132_hcd [ 8.841590] fotg210_hcd: FOTG210 Host Controller (EHCI) Driver [ 8.843571] Warning! fotg210_hcd should always be loaded before uhci_hcd and ohci_hcd, not after [ 8.846848] usbcore: registered new interface driver cdc_acm [ 8.848273] cdc_acm: USB Abstract Control Model driver for USB modems and ISDN adapters [ 8.850818] usbcore: registered new interface driver usblp [ 8.853270] usbcore: registered new interface driver cdc_wdm [ 8.854856] usbcore: registered new interface driver usbtmc [ 8.857631] usbcore: registered new interface driver uas [ 8.859465] usbcore: registered new interface driver usb-storage [ 8.861331] usbcore: registered new interface driver ums-alauda [ 8.862975] usbcore: registered new interface driver ums-cypress [ 8.864603] usbcore: registered new interface driver ums-datafab [ 8.867457] usbcore: registered new interface driver ums_eneub6250 [ 8.869298] usbcore: registered new interface driver ums-freecom [ 8.871112] usbcore: registered new interface driver ums-isd200 [ 8.872900] usbcore: registered new interface driver ums-jumpshot [ 8.878602] usbcore: registered new interface driver ums-karma [ 8.880125] usbcore: registered new interface driver ums-onetouch [ 8.881950] usbcore: registered new interface driver ums-realtek [ 8.883664] usbcore: registered new interface driver ums-sddr09 [ 8.885459] usbcore: registered new interface driver ums-sddr55 [ 8.887811] usbcore: registered new interface driver ums-usbat [ 8.889676] usbcore: registered new interface driver mdc800 [ 8.891035] mdc800: v0.7.5 (30/10/2000):USB Driver for Mustek MDC800 Digital Camera [ 8.893186] usbcore: registered new interface driver microtekX6 [ 8.895145] usbcore: registered new interface driver usbserial_generic [ 8.898060] usbserial: USB Serial support registered for generic [ 8.899886] usbcore: registered new interface driver aircable [ 8.901562] usbserial: USB Serial support registered for aircable [ 8.903621] usbcore: registered new interface driver ark3116 [ 8.907118] usbserial: USB Serial support registered for ark3116 [ 8.909276] usbcore: registered new interface driver belkin_sa [ 8.910939] usbserial: USB Serial support registered for Belkin / Peracom / GoHubs USB Serial Adapter [ 8.913449] usbcore: registered new interface driver ch341 [ 8.914990] usbserial: USB Serial support registered for ch341-uart [ 8.917890] usbcore: registered new interface driver cp210x [ 8.919650] usbserial: USB Serial support registered for cp210x [ 8.921394] usbcore: registered new interface driver cyberjack [ 8.923272] usbserial: USB Serial support registered for Reiner SCT Cyberjack USB card reader [ 8.926317] usbcore: registered new interface driver cypress_m8 [ 8.928140] usbserial: USB Serial support registered for DeLorme Earthmate USB [ 8.930299] usbserial: USB Serial support registered for HID->COM RS232 Adapter [ 8.932346] usbserial: USB Serial support registered for Nokia CA-42 V2 Adapter [ 8.934468] usbcore: registered new interface driver usb_debug [ 8.936999] usbserial: USB Serial support registered for debug [ 8.938681] usbserial: USB Serial support registered for xhci_dbc [ 8.940416] usbcore: registered new interface driver digi_acceleport [ 8.942467] usbserial: USB Serial support registered for Digi 2 port USB adapter [ 8.944665] usbserial: USB Serial support registered for Digi 4 port USB adapter [ 8.947362] usbcore: registered new interface driver io_edgeport [ 8.948876] usbserial: USB Serial support registered for Edgeport 2 port adapter [ 8.950974] usbserial: USB Serial support registered for Edgeport 4 port adapter [ 8.952941] usbserial: USB Serial support registered for Edgeport 8 port adapter [ 8.954904] usbserial: USB Serial support registered for EPiC device [ 8.957874] usbcore: registered new interface driver io_ti [ 8.959508] usbserial: USB Serial support registered for Edgeport TI 1 port adapter [ 8.961452] usbserial: USB Serial support registered for Edgeport TI 2 port adapter [ 8.963651] usbcore: registered new interface driver empeg [ 8.965176] usbserial: USB Serial support registered for empeg [ 8.968091] usbcore: registered new interface driver f81232 [ 8.969839] usbserial: USB Serial support registered for f81232 [ 8.971484] usbcore: registered new interface driver f81534 [ 8.973065] usbserial: USB Serial support registered for Fintek F81532/F81534 [ 8.975069] usbcore: registered new interface driver ftdi_sio [ 8.977508] usbserial: USB Serial support registered for FTDI USB Serial Device [ 8.979834] usbcore: registered new interface driver garmin_gps [ 8.981514] usbserial: USB Serial support registered for Garmin GPS usb/tty [ 8.983560] usbcore: registered new interface driver ipaq [ 8.985335] usbserial: USB Serial support registered for PocketPC PDA [ 8.987987] usbcore: registered new interface driver ipw [ 8.989561] usbserial: USB Serial support registered for IPWireless converter [ 8.991554] usbcore: registered new interface driver ir_usb [ 8.993125] usbserial: USB Serial support registered for IR Dongle [ 8.994916] usbcore: registered new interface driver iuu_phoenix [ 8.997440] usbserial: USB Serial support registered for iuu_phoenix [ 8.999342] usbcore: registered new interface driver keyspan [ 9.000893] usbserial: USB Serial support registered for Keyspan - (without firmware) [ 9.003209] usbserial: USB Serial support registered for Keyspan 1 port adapter [ 9.005193] usbserial: USB Serial support registered for Keyspan 2 port adapter [ 9.008064] usbserial: USB Serial support registered for Keyspan 4 port adapter [ 9.011507] usbcore: registered new interface driver keyspan_pda [ 9.013143] usbserial: USB Serial support registered for Keyspan PDA [ 9.014809] usbserial: USB Serial support registered for Keyspan PDA - (prerenumeration) [ 9.018616] usbserial: USB Serial support registered for Xircom / Entrega PGS - (prerenumeration) [ 9.021156] usbcore: registered new interface driver kl5kusb105 [ 9.022807] usbserial: USB Serial support registered for KL5KUSB105D / PalmConnect [ 9.024917] usbcore: registered new interface driver kobil_sct [ 9.026843] usbserial: USB Serial support registered for KOBIL USB smart card terminal [ 9.029480] usbcore: registered new interface driver mct_u232 [ 9.031239] usbserial: USB Serial support registered for MCT U232 [ 9.033277] usbcore: registered new interface driver metro_usb [ 9.035138] usbserial: USB Serial support registered for Metrologic USB to Serial [ 9.039745] usbcore: registered new interface driver mos7720 [ 9.041484] usbserial: USB Serial support registered for Moschip 2 port adapter [ 9.043579] usbcore: registered new interface driver mos7840 [ 9.045223] usbserial: USB Serial support registered for Moschip 7840/7820 USB Serial Driver [ 9.048623] usbcore: registered new interface driver mxuport [ 9.050468] usbserial: USB Serial support registered for MOXA UPort [ 9.052467] usbcore: registered new interface driver navman [ 9.054131] usbserial: USB Serial support registered for navman [ 9.056172] usbcore: registered new interface driver omninet [ 9.057805] usbserial: USB Serial support registered for ZyXEL - omni.net lcd plus usb [ 9.060202] usbcore: registered new interface driver opticon [ 9.062923] usbserial: USB Serial support registered for opticon [ 9.064734] usbcore: registered new interface driver option [ 9.067469] usbserial: USB Serial support registered for GSM modem (1-port) [ 9.069650] usbcore: registered new interface driver oti6858 [ 9.071426] usbserial: USB Serial support registered for oti6858 [ 9.073328] usbcore: registered new interface driver pl2303 [ 9.075111] usbserial: USB Serial support registered for pl2303 [ 9.077800] usbcore: registered new interface driver qcaux [ 9.079529] usbserial: USB Serial support registered for qcaux [ 9.081417] usbcore: registered new interface driver qcserial [ 9.083610] usbserial: USB Serial support registered for Qualcomm USB modem [ 9.086714] usbcore: registered new interface driver quatech2 [ 9.088418] usbserial: USB Serial support registered for Quatech 2nd gen USB to Serial Driver [ 9.090964] usbcore: registered new interface driver safe_serial [ 9.092913] usbserial: USB Serial support registered for safe_serial [ 9.095021] usbcore: registered new interface driver sierra [ 9.097527] usbserial: USB Serial support registered for Sierra USB modem [ 9.099608] usbcore: registered new interface driver usb_serial_simple [ 9.101673] usbserial: USB Serial support registered for carelink [ 9.103611] usbserial: USB Serial support registered for zio [ 9.105488] usbserial: USB Serial support registered for funsoft [ 9.107860] usbserial: USB Serial support registered for flashloader [ 9.109766] usbserial: USB Serial support registered for google [ 9.111652] usbserial: USB Serial support registered for libtransistor [ 9.113911] usbserial: USB Serial support registered for vivopay [ 9.116581] usbserial: USB Serial support registered for moto_modem [ 9.118555] usbserial: USB Serial support registered for motorola_tetra [ 9.120814] usbserial: USB Serial support registered for novatel_gps [ 9.122695] usbserial: USB Serial support registered for hp4x [ 9.124408] usbserial: USB Serial support registered for suunto [ 9.127334] usbserial: USB Serial support registered for siemens_mpi [ 9.129523] usbcore: registered new interface driver spcp8x5 [ 9.131283] usbserial: USB Serial support registered for SPCP8x5 [ 9.133140] usbcore: registered new interface driver ssu100 [ 9.134776] usbserial: USB Serial support registered for Quatech SSU-100 USB to Serial Driver [ 9.137677] usbcore: registered new interface driver symbolserial [ 9.139734] usbserial: USB Serial support registered for symbol [ 9.141700] usbcore: registered new interface driver ti_usb_3410_5052 [ 9.144436] usbserial: USB Serial support registered for TI USB 3410 1 port adapter [ 9.148739] usbserial: USB Serial support registered for TI USB 5052 2 port adapter [ 9.151723] usbcore: registered new interface driver upd78f0730 [ 9.153435] usbserial: USB Serial support registered for upd78f0730 [ 9.155423] usbcore: registered new interface driver visor [ 9.157550] usbserial: USB Serial support registered for Handspring Visor / Palm OS [ 9.159895] usbserial: USB Serial support registered for Sony Clie 5.0 [ 9.161859] usbserial: USB Serial support registered for Sony Clie 3.5 [ 9.164055] usbcore: registered new interface driver wishbone_serial [ 9.166746] usbserial: USB Serial support registered for wishbone_serial [ 9.168927] usbcore: registered new interface driver whiteheat [ 9.170740] usbserial: USB Serial support registered for Connect Tech - WhiteHEAT - (prerenumeration) [ 9.172878] usbserial: USB Serial support registered for Connect Tech - WhiteHEAT [ 9.174998] usbcore: registered new interface driver xsens_mt [ 9.177362] usbserial: USB Serial support registered for xsens_mt [ 9.179554] usbcore: registered new interface driver adutux [ 9.181374] usbcore: registered new interface driver appledisplay [ 9.183198] usbcore: registered new interface driver cypress_cy7c63 [ 9.185130] usbcore: registered new interface driver cytherm [ 9.187566] usbcore: registered new interface driver emi26 - firmware loader [ 9.189618] usbcore: registered new interface driver emi62 - firmware loader [ 9.191802] ftdi_elan: driver ftdi-elan [ 9.193170] usbcore: registered new interface driver ftdi-elan [ 9.196834] usbcore: registered new interface driver idmouse [ 9.198783] usbcore: registered new interface driver iowarrior [ 9.200586] usbcore: registered new interface driver isight_firmware [ 9.202442] usbcore: registered new interface driver usblcd [ 9.204274] usbcore: registered new interface driver ldusb [ 9.206581] usbcore: registered new interface driver legousbtower [ 9.208719] usbcore: registered new interface driver usbtest [ 9.210405] usbcore: registered new interface driver usb_ehset_test [ 9.212340] usbcore: registered new interface driver trancevibrator [ 9.214216] usbcore: registered new interface driver uss720 [ 9.216720] uss720: USB Parport Cable driver for Cables using the Lucent Technologies USS720 Chip [ 9.219026] uss720: NOTE: this is a special purpose driver to allow nonstandard [ 9.221866] uss720: protocols (eg. bitbang) over USS720 usb to parallel cables [ 9.223980] uss720: If you just want to connect to a printer, use usblp instead [ 9.226937] usbcore: registered new interface driver usbsevseg [ 9.228946] usbcore: registered new interface driver yurex [ 9.231082] usbcore: registered new interface driver chaoskey [ 9.232773] usbcore: registered new interface driver sisusb [ 9.234420] usbcore: registered new interface driver lvs [ 9.237190] usbcore: registered new interface driver cxacru [ 9.239131] usbcore: registered new interface driver speedtch [ 9.240979] usbcore: registered new interface driver ueagle-atm [ 9.242585] xusbatm: malformed module parameters [ 9.247894] dummy_hcd dummy_hcd.0: USB Host+Gadget Emulator, driver 02 May 2005 [ 9.250310] dummy_hcd dummy_hcd.0: Dummy host controller [ 9.254799] dummy_hcd dummy_hcd.0: new USB bus registered, assigned bus number 1 [ 9.258633] usb usb1: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.261034] usb usb1: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.262914] usb usb1: Product: Dummy host controller [ 9.264622] usb usb1: Manufacturer: Linux 4.19.190-syzkaller dummy_hcd [ 9.266786] usb usb1: SerialNumber: dummy_hcd.0 [ 9.271993] hub 1-0:1.0: USB hub found [ 9.273478] hub 1-0:1.0: 1 port detected [ 9.279012] dummy_hcd dummy_hcd.1: USB Host+Gadget Emulator, driver 02 May 2005 [ 9.281277] dummy_hcd dummy_hcd.1: Dummy host controller [ 9.284289] dummy_hcd dummy_hcd.1: new USB bus registered, assigned bus number 2 [ 9.288982] usb usb2: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.291466] usb usb2: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.293430] usb usb2: Product: Dummy host controller [ 9.294750] usb usb2: Manufacturer: Linux 4.19.190-syzkaller dummy_hcd [ 9.296780] usb usb2: SerialNumber: dummy_hcd.1 [ 9.303222] hub 2-0:1.0: USB hub found [ 9.304637] hub 2-0:1.0: 1 port detected [ 9.309237] dummy_hcd dummy_hcd.2: USB Host+Gadget Emulator, driver 02 May 2005 [ 9.311448] dummy_hcd dummy_hcd.2: Dummy host controller [ 9.314447] dummy_hcd dummy_hcd.2: new USB bus registered, assigned bus number 3 [ 9.317988] usb usb3: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.320465] usb usb3: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.322384] usb usb3: Product: Dummy host controller [ 9.323759] usb usb3: Manufacturer: Linux 4.19.190-syzkaller dummy_hcd [ 9.325635] usb usb3: SerialNumber: dummy_hcd.2 [ 9.330528] hub 3-0:1.0: USB hub found [ 9.331939] hub 3-0:1.0: 1 port detected [ 9.336355] dummy_hcd dummy_hcd.3: USB Host+Gadget Emulator, driver 02 May 2005 [ 9.338506] dummy_hcd dummy_hcd.3: Dummy host controller [ 9.342273] dummy_hcd dummy_hcd.3: new USB bus registered, assigned bus number 4 [ 9.345593] usb usb4: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.347956] usb usb4: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.349984] usb usb4: Product: Dummy host controller [ 9.351409] usb usb4: Manufacturer: Linux 4.19.190-syzkaller dummy_hcd [ 9.353256] usb usb4: SerialNumber: dummy_hcd.3 [ 9.357435] hub 4-0:1.0: USB hub found [ 9.359271] hub 4-0:1.0: 1 port detected [ 9.363947] dummy_hcd dummy_hcd.4: USB Host+Gadget Emulator, driver 02 May 2005 [ 9.366219] dummy_hcd dummy_hcd.4: Dummy host controller [ 9.369158] dummy_hcd dummy_hcd.4: new USB bus registered, assigned bus number 5 [ 9.372802] usb usb5: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.375047] usb usb5: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.377210] usb usb5: Product: Dummy host controller [ 9.378695] usb usb5: Manufacturer: Linux 4.19.190-syzkaller dummy_hcd [ 9.380429] usb usb5: SerialNumber: dummy_hcd.4 [ 9.384518] hub 5-0:1.0: USB hub found [ 9.387230] hub 5-0:1.0: 1 port detected [ 9.391320] dummy_hcd dummy_hcd.5: USB Host+Gadget Emulator, driver 02 May 2005 [ 9.393477] dummy_hcd dummy_hcd.5: Dummy host controller [ 9.396709] dummy_hcd dummy_hcd.5: new USB bus registered, assigned bus number 6 [ 9.399822] usb usb6: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.402413] usb usb6: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.404499] usb usb6: Product: Dummy host controller [ 9.406054] usb usb6: Manufacturer: Linux 4.19.190-syzkaller dummy_hcd [ 9.407863] usb usb6: SerialNumber: dummy_hcd.5 [ 9.412096] hub 6-0:1.0: USB hub found [ 9.413481] hub 6-0:1.0: 1 port detected [ 9.419128] dummy_hcd dummy_hcd.6: USB Host+Gadget Emulator, driver 02 May 2005 [ 9.420979] dummy_hcd dummy_hcd.6: Dummy host controller [ 9.423906] dummy_hcd dummy_hcd.6: new USB bus registered, assigned bus number 7 [ 9.426945] usb usb7: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.429193] usb usb7: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.431603] usb usb7: Product: Dummy host controller [ 9.432957] usb usb7: Manufacturer: Linux 4.19.190-syzkaller dummy_hcd [ 9.434767] usb usb7: SerialNumber: dummy_hcd.6 [ 9.439614] hub 7-0:1.0: USB hub found [ 9.440927] hub 7-0:1.0: 1 port detected [ 9.445533] dummy_hcd dummy_hcd.7: USB Host+Gadget Emulator, driver 02 May 2005 [ 9.448511] dummy_hcd dummy_hcd.7: Dummy host controller [ 9.451285] dummy_hcd dummy_hcd.7: new USB bus registered, assigned bus number 8 [ 9.455274] usb usb8: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.457749] usb usb8: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.459708] usb usb8: Product: Dummy host controller [ 9.461228] usb usb8: Manufacturer: Linux 4.19.190-syzkaller dummy_hcd [ 9.463072] usb usb8: SerialNumber: dummy_hcd.7 [ 9.467870] hub 8-0:1.0: USB hub found [ 9.469284] hub 8-0:1.0: 1 port detected [ 9.494132] gadgetfs: USB Gadget filesystem, version 24 Aug 2004 [ 9.501673] vhci_hcd vhci_hcd.0: USB/IP Virtual Host Controller [ 9.504702] vhci_hcd vhci_hcd.0: new USB bus registered, assigned bus number 9 [ 9.509915] vhci_hcd: created sysfs vhci_hcd.0 [ 9.512528] usb usb9: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.515183] usb usb9: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.517486] usb usb9: Product: USB/IP Virtual Host Controller [ 9.519451] usb usb9: Manufacturer: Linux 4.19.190-syzkaller vhci_hcd [ 9.521416] usb usb9: SerialNumber: vhci_hcd.0 [ 9.525623] hub 9-0:1.0: USB hub found [ 9.527677] hub 9-0:1.0: 8 ports detected [ 9.538492] vhci_hcd vhci_hcd.0: USB/IP Virtual Host Controller [ 9.541693] vhci_hcd vhci_hcd.0: new USB bus registered, assigned bus number 10 [ 9.544018] usb usb10: We don't know the algorithms for LPM for this host, disabling LPM. [ 9.547895] usb usb10: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 4.19 [ 9.550321] usb usb10: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.552574] usb usb10: Product: USB/IP Virtual Host Controller [ 9.554881] usb usb10: Manufacturer: Linux 4.19.190-syzkaller vhci_hcd [ 9.557072] usb usb10: SerialNumber: vhci_hcd.0 [ 9.561322] hub 10-0:1.0: USB hub found [ 9.562624] hub 10-0:1.0: 8 ports detected [ 9.573490] vhci_hcd vhci_hcd.1: USB/IP Virtual Host Controller [ 9.578759] vhci_hcd vhci_hcd.1: new USB bus registered, assigned bus number 11 [ 9.582056] usb usb11: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.584257] usb usb11: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.586725] usb usb11: Product: USB/IP Virtual Host Controller [ 9.588495] usb usb11: Manufacturer: Linux 4.19.190-syzkaller vhci_hcd [ 9.590182] usb usb11: SerialNumber: vhci_hcd.1 [ 9.594315] hub 11-0:1.0: USB hub found [ 9.595849] hub 11-0:1.0: 8 ports detected [ 9.605631] vhci_hcd vhci_hcd.1: USB/IP Virtual Host Controller [ 9.608495] vhci_hcd vhci_hcd.1: new USB bus registered, assigned bus number 12 [ 9.611317] usb usb12: We don't know the algorithms for LPM for this host, disabling LPM. [ 9.614401] usb usb12: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 4.19 [ 9.617200] usb usb12: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.619348] usb usb12: Product: USB/IP Virtual Host Controller [ 9.621105] usb usb12: Manufacturer: Linux 4.19.190-syzkaller vhci_hcd [ 9.622820] usb usb12: SerialNumber: vhci_hcd.1 [ 9.626837] hub 12-0:1.0: USB hub found [ 9.628206] hub 12-0:1.0: 8 ports detected [ 9.639303] vhci_hcd vhci_hcd.2: USB/IP Virtual Host Controller [ 9.642629] vhci_hcd vhci_hcd.2: new USB bus registered, assigned bus number 13 [ 9.647246] usb usb13: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.649491] usb usb13: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.651432] usb usb13: Product: USB/IP Virtual Host Controller [ 9.653097] usb usb13: Manufacturer: Linux 4.19.190-syzkaller vhci_hcd [ 9.654917] usb usb13: SerialNumber: vhci_hcd.2 [ 9.659083] hub 13-0:1.0: USB hub found [ 9.660271] hub 13-0:1.0: 8 ports detected [ 9.670917] vhci_hcd vhci_hcd.2: USB/IP Virtual Host Controller [ 9.673361] vhci_hcd vhci_hcd.2: new USB bus registered, assigned bus number 14 [ 9.678149] usb usb14: We don't know the algorithms for LPM for this host, disabling LPM. [ 9.682574] usb usb14: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 4.19 [ 9.684861] usb usb14: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.686985] usb usb14: Product: USB/IP Virtual Host Controller [ 9.688503] usb usb14: Manufacturer: Linux 4.19.190-syzkaller vhci_hcd [ 9.690208] usb usb14: SerialNumber: vhci_hcd.2 [ 9.694647] hub 14-0:1.0: USB hub found [ 9.696204] hub 14-0:1.0: 8 ports detected [ 9.708308] vhci_hcd vhci_hcd.3: USB/IP Virtual Host Controller [ 9.711526] vhci_hcd vhci_hcd.3: new USB bus registered, assigned bus number 15 [ 9.715454] usb usb15: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.717936] usb usb15: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.720858] usb usb15: Product: USB/IP Virtual Host Controller [ 9.722515] usb usb15: Manufacturer: Linux 4.19.190-syzkaller vhci_hcd [ 9.724193] usb usb15: SerialNumber: vhci_hcd.3 [ 9.729127] hub 15-0:1.0: USB hub found [ 9.730435] hub 15-0:1.0: 8 ports detected [ 9.739364] vhci_hcd vhci_hcd.3: USB/IP Virtual Host Controller [ 9.742932] vhci_hcd vhci_hcd.3: new USB bus registered, assigned bus number 16 [ 9.745493] usb usb16: We don't know the algorithms for LPM for this host, disabling LPM. [ 9.750622] usb usb16: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 4.19 [ 9.752890] usb usb16: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.754920] usb usb16: Product: USB/IP Virtual Host Controller [ 9.756423] usb usb16: Manufacturer: Linux 4.19.190-syzkaller vhci_hcd [ 9.758268] usb usb16: SerialNumber: vhci_hcd.3 [ 9.762431] hub 16-0:1.0: USB hub found [ 9.763900] hub 16-0:1.0: 8 ports detected [ 9.774706] vhci_hcd vhci_hcd.4: USB/IP Virtual Host Controller [ 9.779027] vhci_hcd vhci_hcd.4: new USB bus registered, assigned bus number 17 [ 9.782657] usb usb17: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.784846] usb usb17: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.786867] usb usb17: Product: USB/IP Virtual Host Controller [ 9.788413] usb usb17: Manufacturer: Linux 4.19.190-syzkaller vhci_hcd [ 9.789962] usb usb17: SerialNumber: vhci_hcd.4 [ 9.794376] hub 17-0:1.0: USB hub found [ 9.796094] hub 17-0:1.0: 8 ports detected [ 9.805252] vhci_hcd vhci_hcd.4: USB/IP Virtual Host Controller [ 9.809696] vhci_hcd vhci_hcd.4: new USB bus registered, assigned bus number 18 [ 9.812270] usb usb18: We don't know the algorithms for LPM for this host, disabling LPM. [ 9.815015] usb usb18: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 4.19 [ 9.817319] usb usb18: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.819295] usb usb18: Product: USB/IP Virtual Host Controller [ 9.820708] usb usb18: Manufacturer: Linux 4.19.190-syzkaller vhci_hcd [ 9.822266] usb usb18: SerialNumber: vhci_hcd.4 [ 9.826817] hub 18-0:1.0: USB hub found [ 9.828011] hub 18-0:1.0: 8 ports detected [ 9.838972] vhci_hcd vhci_hcd.5: USB/IP Virtual Host Controller [ 9.841738] vhci_hcd vhci_hcd.5: new USB bus registered, assigned bus number 19 [ 9.845202] usb usb19: New USB device found, idVendor=1d6b, idProduct=0002, bcdDevice= 4.19 [ 9.848605] usb usb19: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.850439] usb usb19: Product: USB/IP Virtual Host Controller [ 9.852032] usb usb19: Manufacturer: Linux 4.19.190-syzkaller vhci_hcd [ 9.853718] usb usb19: SerialNumber: vhci_hcd.5 [ 9.858032] hub 19-0:1.0: USB hub found [ 9.859253] hub 19-0:1.0: 8 ports detected [ 9.868332] vhci_hcd vhci_hcd.5: USB/IP Virtual Host Controller [ 9.870775] vhci_hcd vhci_hcd.5: new USB bus registered, assigned bus number 20 [ 9.873172] usb usb20: We don't know the algorithms for LPM for this host, disabling LPM. [ 9.877978] usb usb20: New USB device found, idVendor=1d6b, idProduct=0003, bcdDevice= 4.19 [ 9.880045] usb usb20: New USB device strings: Mfr=3, Product=2, SerialNumber=1 [ 9.881930] usb usb20: Product: USB/IP Virtual Host Controller [ 9.883297] usb usb20: Manufacturer: Linux 4.19.190-syzkaller vhci_hcd [ 9.887806] usb usb20: SerialNumber: vhci_hcd.5 [ 9.891688] hub 20-0:1.0: USB hub found [ 9.893029] hub 20-0:1.0: 8 ports detected