Warning: Permanently added '10.128.1.42' (ECDSA) to the list of known hosts. 2019/05/01 03:51:01 fuzzer started 2019/05/01 03:51:04 dialing manager at 10.128.0.26:34869 2019/05/01 03:51:04 syscalls: 2440 2019/05/01 03:51:04 code coverage: enabled 2019/05/01 03:51:04 comparison tracing: enabled 2019/05/01 03:51:04 extra coverage: extra coverage is not supported by the kernel 2019/05/01 03:51:04 setuid sandbox: enabled 2019/05/01 03:51:04 namespace sandbox: enabled 2019/05/01 03:51:04 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/01 03:51:04 fault injection: enabled 2019/05/01 03:51:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/01 03:51:04 net packet injection: enabled 2019/05/01 03:51:04 net device setup: enabled 03:52:32 executing program 0: syzkaller login: [ 144.449267][ T8099] IPVS: ftp: loaded support on port[0] = 21 03:52:32 executing program 1: [ 144.615903][ T8099] chnl_net:caif_netlink_parms(): no params data found [ 144.698813][ T8102] IPVS: ftp: loaded support on port[0] = 21 [ 144.707413][ T8099] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.719577][ T8099] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.730445][ T8099] device bridge_slave_0 entered promiscuous mode [ 144.755649][ T8099] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.762776][ T8099] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.772608][ T8099] device bridge_slave_1 entered promiscuous mode 03:52:32 executing program 2: [ 144.828854][ T8099] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 144.854824][ T8099] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 144.950200][ T8099] team0: Port device team_slave_0 added [ 144.989356][ T8099] team0: Port device team_slave_1 added [ 145.009372][ T8102] chnl_net:caif_netlink_parms(): no params data found 03:52:32 executing program 3: [ 145.118762][ T8099] device hsr_slave_0 entered promiscuous mode [ 145.184047][ T8099] device hsr_slave_1 entered promiscuous mode [ 145.236199][ T8102] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.245976][ T8102] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.254571][ T8102] device bridge_slave_0 entered promiscuous mode [ 145.262581][ T8102] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.272192][ T8102] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.280593][ T8102] device bridge_slave_1 entered promiscuous mode [ 145.308718][ T8107] IPVS: ftp: loaded support on port[0] = 21 [ 145.317525][ T8105] IPVS: ftp: loaded support on port[0] = 21 [ 145.332029][ T8099] bridge0: port 2(bridge_slave_1) entered blocking state [ 145.339314][ T8099] bridge0: port 2(bridge_slave_1) entered forwarding state [ 145.347292][ T8099] bridge0: port 1(bridge_slave_0) entered blocking state [ 145.354415][ T8099] bridge0: port 1(bridge_slave_0) entered forwarding state 03:52:33 executing program 4: [ 145.381421][ T8102] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 145.410274][ T8102] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 145.527366][ T8102] team0: Port device team_slave_0 added [ 145.560535][ T8102] team0: Port device team_slave_1 added [ 145.604477][ T3338] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.623504][ T3338] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.671944][ T8110] IPVS: ftp: loaded support on port[0] = 21 03:52:33 executing program 5: [ 145.722266][ T8099] 8021q: adding VLAN 0 to HW filter on device bond0 [ 145.847523][ T8102] device hsr_slave_0 entered promiscuous mode [ 145.923630][ T8102] device hsr_slave_1 entered promiscuous mode [ 145.982736][ T8116] IPVS: ftp: loaded support on port[0] = 21 [ 146.015035][ T8107] chnl_net:caif_netlink_parms(): no params data found [ 146.025131][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 146.034644][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 146.044138][ T8099] 8021q: adding VLAN 0 to HW filter on device team0 [ 146.102911][ T8105] chnl_net:caif_netlink_parms(): no params data found [ 146.137273][ T8108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 146.146108][ T8108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 146.154941][ T8108] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.161991][ T8108] bridge0: port 1(bridge_slave_0) entered forwarding state [ 146.169707][ T8108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 146.179137][ T8108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 146.187593][ T8108] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.194680][ T8108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 146.202497][ T8108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 146.236684][ T8107] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.244414][ T8107] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.252449][ T8107] device bridge_slave_0 entered promiscuous mode [ 146.273420][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 146.282085][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 146.291510][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 146.300078][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 146.308532][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 146.317104][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 146.325526][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 146.333926][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 146.342145][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 146.352868][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 146.377750][ T8107] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.386212][ T8107] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.394119][ T8107] device bridge_slave_1 entered promiscuous mode [ 146.402280][ T8099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 146.426012][ T8105] bridge0: port 1(bridge_slave_0) entered blocking state [ 146.433103][ T8105] bridge0: port 1(bridge_slave_0) entered disabled state [ 146.441072][ T8105] device bridge_slave_0 entered promiscuous mode [ 146.476845][ T8105] bridge0: port 2(bridge_slave_1) entered blocking state [ 146.484084][ T8105] bridge0: port 2(bridge_slave_1) entered disabled state [ 146.491806][ T8105] device bridge_slave_1 entered promiscuous mode [ 146.548232][ T8099] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 146.558123][ T8105] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 146.590975][ T8107] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 146.621637][ T8105] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 146.658157][ T8107] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 146.699101][ T8105] team0: Port device team_slave_0 added [ 146.720961][ T8107] team0: Port device team_slave_0 added [ 146.729103][ T8110] chnl_net:caif_netlink_parms(): no params data found [ 146.748948][ T8116] chnl_net:caif_netlink_parms(): no params data found [ 146.762591][ T8105] team0: Port device team_slave_1 added [ 146.769975][ T8107] team0: Port device team_slave_1 added 03:52:34 executing program 0: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000a00)={0x0, 0x989680}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3, 0x4032, 0xffffffffffffffff, 0x0) exit(0x0) [ 146.916840][ T8105] device hsr_slave_0 entered promiscuous mode [ 146.983674][ T8105] device hsr_slave_1 entered promiscuous mode [ 147.116870][ T8107] device hsr_slave_0 entered promiscuous mode [ 147.143652][ T8107] device hsr_slave_1 entered promiscuous mode [ 147.208388][ T8102] 8021q: adding VLAN 0 to HW filter on device bond0 [ 147.231508][ T8116] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.239126][ T8116] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.247258][ T8116] device bridge_slave_0 entered promiscuous mode [ 147.257356][ T8116] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.264780][ T8116] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.272775][ T8116] device bridge_slave_1 entered promiscuous mode [ 147.290371][ T8110] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.298766][ T8110] bridge0: port 1(bridge_slave_0) entered disabled state [ 147.306767][ T8110] device bridge_slave_0 entered promiscuous mode [ 147.322545][ T8110] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.333069][ T8110] bridge0: port 2(bridge_slave_1) entered disabled state [ 147.341647][ T8110] device bridge_slave_1 entered promiscuous mode [ 147.360717][ T8108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 147.368444][ T8108] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 147.379288][ T8102] 8021q: adding VLAN 0 to HW filter on device team0 [ 147.397058][ T8116] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 147.412797][ T8110] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 147.423879][ T8110] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 147.442296][ T8116] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 147.462920][ T8110] team0: Port device team_slave_0 added [ 147.489752][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 147.498714][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 147.507175][ T2850] bridge0: port 1(bridge_slave_0) entered blocking state [ 147.514290][ T2850] bridge0: port 1(bridge_slave_0) entered forwarding state [ 147.523379][ T8110] team0: Port device team_slave_1 added [ 147.529985][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 147.540643][ T8116] team0: Port device team_slave_0 added [ 147.548913][ T8116] team0: Port device team_slave_1 added [ 147.588586][ T8108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 147.597684][ T8108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 147.606381][ T8108] bridge0: port 2(bridge_slave_1) entered blocking state [ 147.613469][ T8108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 147.623604][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 147.697029][ T8110] device hsr_slave_0 entered promiscuous mode [ 147.753746][ T8110] device hsr_slave_1 entered promiscuous mode 03:52:35 executing program 0: 03:52:35 executing program 0: [ 147.866696][ T8116] device hsr_slave_0 entered promiscuous mode 03:52:35 executing program 0: 03:52:35 executing program 0: [ 147.926259][ T8116] device hsr_slave_1 entered promiscuous mode 03:52:35 executing program 0: [ 147.989679][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready 03:52:35 executing program 0: [ 148.061579][ T8102] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 148.080464][ T8102] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 148.117799][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 148.129871][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 148.146280][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 148.154913][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 148.163435][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 148.171632][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.181175][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 148.189502][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.215826][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 148.223874][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 148.239299][ T8105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.280725][ T8102] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 148.302679][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.311573][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.328375][ T8105] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.342082][ T8107] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.370622][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.379839][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.388776][ T23] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.395882][ T23] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.405697][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.414249][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.422534][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.429631][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.437605][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 148.446946][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 148.491074][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 148.500360][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 148.516001][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready 03:52:36 executing program 1: [ 148.537585][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 148.547292][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 148.561865][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.570311][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.584239][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 148.592658][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 148.601378][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 148.610656][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 148.619325][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 148.635401][ T8107] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.657501][ T8116] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.667509][ T8110] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.678793][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.688489][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.697027][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.704137][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.721314][ T8105] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 148.734483][ T8108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 148.742528][ T8108] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.751696][ T8108] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.761232][ T8108] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.768368][ T8108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.783030][ T8116] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.799429][ T8110] 8021q: adding VLAN 0 to HW filter on device team0 [ 148.810205][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.820649][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.828703][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 148.837349][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 148.863810][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.872879][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.881480][ T8111] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.888663][ T8111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.897492][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 148.906224][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 148.915161][ T8111] bridge0: port 1(bridge_slave_0) entered blocking state [ 148.922302][ T8111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 148.930454][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 148.939328][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 148.947813][ T8111] bridge0: port 2(bridge_slave_1) entered blocking state [ 148.954886][ T8111] bridge0: port 2(bridge_slave_1) entered forwarding state [ 148.962438][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 148.971647][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 148.981532][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 148.990149][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 149.006790][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.035984][ T3338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 149.047141][ T3338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 149.067167][ T3338] bridge0: port 2(bridge_slave_1) entered blocking state [ 149.074338][ T3338] bridge0: port 2(bridge_slave_1) entered forwarding state 03:52:36 executing program 2: [ 149.083254][ T3338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 149.094243][ T3338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.102997][ T3338] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.112990][ T3338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.134273][ T3338] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.142452][ T3338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 149.152419][ T3338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.161605][ T3338] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.184621][ T3338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.194896][ T3338] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.204898][ T3338] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.232466][ T8110] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 149.244620][ T8110] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 149.261693][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.270725][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.279467][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.289661][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.298527][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.306953][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.315944][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.324468][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.335154][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.342823][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 149.352417][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 149.377735][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 149.386179][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.395155][ T8111] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.409495][ T8110] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.422680][ T8107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.437275][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 149.448832][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 149.462761][ T8116] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 149.474574][ T8116] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 149.491076][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 149.499958][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 149.508685][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 149.521125][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 149.529817][ T2850] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 149.565125][ T8116] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 149.602399][ T8107] 8021q: adding VLAN 0 to HW filter on device batadv0 03:52:37 executing program 3: 03:52:37 executing program 0: 03:52:37 executing program 5: 03:52:37 executing program 1: 03:52:37 executing program 2: 03:52:37 executing program 4: 03:52:37 executing program 2: 03:52:37 executing program 1: 03:52:37 executing program 4: 03:52:37 executing program 0: 03:52:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000140)={0x30, 0x0, 0x805, 0x0, 0x0, {{}, 0x0, 0x3, 0x0, {0x14}}}, 0x30}}, 0x0) futex(0x0, 0xb, 0x0, 0x0, 0x0, 0x0) r0 = gettid() perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x800, 0x2, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff5a8, 0x0, 0x5, 0x400, 0x0, 0x0, 0x2, 0x0, 0x40, 0xffffffffffffffe1, 0x0, 0x6, 0x9, 0x6f, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4}, r0, 0xf, 0xffffffffffffffff, 0x9) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000340)) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x7003, 0x0) preadv(r2, &(0x7f0000000280)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x0) r3 = syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0xc040564a, &(0x7f00000001c0)) 03:52:37 executing program 3: syz_execute_func(&(0x7f0000000180)="0c1eb5b598cd80f0864100f56962f5696200d9d9d08fe9589b26c7e4c753fbc4e101edfec4427d822a2a00c4f2168f4808eebce00000802000c4c3dd6d6807485151c1ea01f265dc5f00c35b5b45363ef80f9966030faee4f0400fbaae00800000ba67f2ab47000026400f0d18c401fe5ff6df646734676670664336660fd2938c0000000f01c36666450f17720d5414111d54118c") 03:52:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(0x0, 0xb, 0x0, 0x0, 0x0, 0x0) r0 = gettid() perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x800, 0x2, 0x9, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffff5a8, 0x0, 0x5, 0x400, 0x0, 0x0, 0x0, 0x4, 0x40, 0xffffffffffffffe1, 0x0, 0x6, 0x9, 0x6f, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4}, r0, 0xf, 0xffffffffffffffff, 0x9) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000340)) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x7003, 0x0) preadv(r2, &(0x7f0000000280)=[{&(0x7f00000003c0)=""/116, 0x74}], 0x1, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0xc040564a, &(0x7f00000001c0)) 03:52:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000004) write(r0, &(0x7f0000000000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) 03:52:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=ANY=[@ANYBLOB="fe8000000000000000000000000000aa000000086c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000025bd7000"/176], 0x1}, 0x8}, 0x0) 03:52:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:38 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2b, 'cpu'}]}, 0x5) 03:52:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4000000004) write(r0, &(0x7f0000000000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) [ 150.262226][ C1] hrtimer: interrupt took 29062 ns 03:52:38 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:38 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x404000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.opaque\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x3) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x18, r3, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}}, 0x20000000) r4 = msgget(0x2, 0x408) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000380)=""/193) getrandom(&(0x7f00000000c0)=""/181, 0xb5, 0x2) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000600)) write$cgroup_subtree(r0, &(0x7f0000000340)={[{0x2b, 'rdma'}]}, 0x6) 03:52:38 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040), 0x1c) r1 = syz_open_pts(0xffffffffffffffff, 0x4000) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='personality\x00') read$eventfd(r2, &(0x7f0000000100), 0x8) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000180)) r3 = socket$packet(0x11, 0x3, 0x300) r4 = dup2(r3, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r4, 0x0) unshare(0x28000000) fremovexattr(r5, &(0x7f00000003c0)=ANY=[@ANYBLOB="62747266732e242c647468479173656c662d73656c666264775e63e1f9379fc72f002b34068c6576766d6e6574396574683000b5737be736f5276d07b068fbefbdbad0ea8fd7a53485a451ff45d1ff532b142c13af571ff26ccade13d81df2f672eaa80d3a40b6fabe02204877327dd10853874e2dc69c3c1e07d4218e0ffb7f90e182ccda2d38d8d6d19b62f995c69052339b365f679fa66b7805ed0a13789a09f541cdc39d224b33ca081689683f25e942d6a6b40000006d"]) r6 = fcntl$getown(r3, 0x9) sched_getaffinity(r6, 0x8, &(0x7f00000004c0)) r7 = mq_open(&(0x7f0000000080)='$(eth1self-selfbdevvmnet1eth0\x00', 0x6e93ebbb880884f2, 0x0, 0x0) fchmod(r1, 0x4) clone(0x800000, 0x0, 0x0, 0x0, &(0x7f0000000240)="83d1ddda0c54763f21489603dba36660b84888d4b2ce9485ccb814a7e63a4d09d064adb48ccd0b9154e59d72638019970b913ec1b751b2682589f3122555f7cc49ed97cc1f05f6c9124f40f61315015a4a887029f11b36e42c0a361953074e3a5c0254dd4e317c05d9ac578bec") mq_getsetattr(r7, &(0x7f0000000000)={0x0, 0xa2, 0x87, 0x400, 0x1c0000000000, 0x9, 0x0, 0x80000000}, &(0x7f0000000040)) 03:52:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x6, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2a, 0xffffff9c}}, &(0x7f0000003ff6)='GPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 03:52:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") [ 150.683618][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 150.689656][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 151.003631][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 151.009510][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:39 executing program 2: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x4003ff) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xfe6c) 03:52:39 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x404000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.opaque\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x3) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x18, r3, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}}, 0x20000000) r4 = msgget(0x2, 0x408) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000380)=""/193) getrandom(&(0x7f00000000c0)=""/181, 0xb5, 0x2) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000600)) write$cgroup_subtree(r0, &(0x7f0000000340)={[{0x2b, 'rdma'}]}, 0x6) 03:52:39 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x404000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.opaque\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x3) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x18, r3, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}}, 0x20000000) r4 = msgget(0x2, 0x408) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000380)=""/193) getrandom(&(0x7f00000000c0)=""/181, 0xb5, 0x2) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000600)) write$cgroup_subtree(r0, &(0x7f0000000340)={[{0x2b, 'rdma'}]}, 0x6) 03:52:39 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(r2, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:39 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:39 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7003, 0x0) 03:52:39 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:39 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:39 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") [ 151.676524][ T8329] syz-executor.5 (8329) used greatest stack depth: 22912 bytes left [ 151.723691][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 151.729564][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:39 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x404000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.opaque\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x3) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x18, r3, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}}, 0x20000000) r4 = msgget(0x2, 0x408) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000380)=""/193) getrandom(&(0x7f00000000c0)=""/181, 0xb5, 0x2) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000600)) write$cgroup_subtree(r0, &(0x7f0000000340)={[{0x2b, 'rdma'}]}, 0x6) 03:52:39 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000001c0)='cgroup.subtree_control\x00', 0x2, 0x0) readv(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/40, 0x28}], 0x1) 03:52:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f00000001c0)="1098ce66000000007be070") r1 = socket$inet6_udplite(0xa, 0x2, 0x88) close(r1) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000180)=[{0x6}]}, 0x10) close(r2) 03:52:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:39 executing program 4: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:39 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) [ 151.973754][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 151.979571][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 151.985456][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 151.991231][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:52:40 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:40 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:40 executing program 3: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvmmsg(r0, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}}], 0x1, 0x3, 0x0) 03:52:40 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:40 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000200)={{0x0, 0x0, 0xfffff000}}) 03:52:40 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 152.390556][ T8405] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. 03:52:40 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:40 executing program 0: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x8, 0x404000) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.opaque\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x3) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x18, r3, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}}, 0x20000000) r4 = msgget(0x2, 0x408) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) msgctl$IPC_STAT(r4, 0x2, &(0x7f0000000380)=""/193) getrandom(&(0x7f00000000c0)=""/181, 0xb5, 0x2) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000600)) write$cgroup_subtree(r0, &(0x7f0000000340)={[{0x2b, 'rdma'}]}, 0x6) 03:52:41 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:41 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:41 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:41 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:41 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:41 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:41 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 154.025667][ T8445] __ntfs_error: 3 callbacks suppressed [ 154.025679][ T8445] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") [ 154.144547][ T8445] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:42 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:42 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 154.442875][ T8482] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:42 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:42 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:42 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 154.745179][ T8510] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:42 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:43 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:43 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 155.258110][ T8543] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:43 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:43 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 03:52:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") [ 155.661556][ T8575] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:43 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 155.893770][ C1] net_ratelimit: 14 callbacks suppressed [ 155.893818][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 155.906046][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:43 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 03:52:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") [ 156.078352][ T8609] ntfs: (device loop2): parse_options(): Unrecognized mount option . [ 156.123458][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 156.129292][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 156.135162][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 156.140941][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 156.227950][ T8576] syz-executor.5 (8576) used greatest stack depth: 22864 bytes left 03:52:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 03:52:44 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 03:52:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c12") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") [ 156.376753][ T8627] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c12") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:44 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c12") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:44 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 156.770066][ T8661] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") [ 156.923998][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 156.930066][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:44 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 03:52:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:44 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") [ 157.121396][ T8681] ntfs: (device loop2): parse_options(): Unrecognized mount option . [ 157.243394][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 157.249258][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) 03:52:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319b") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:45 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:45 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 03:52:45 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:45 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) 03:52:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd0") syz_execute_func(&(0x7f0000000140)="0c0ab5b598cd801b69e4f56962f5696200d9d9d08fe9589b26c7e4c753fbc46111edfec4427d0f82822a00c4356af2178f4808eebce00000802000c4c3dd6d6807485151c1ea01c35b5b45363ef80f9966030faee42c2467f2ab47000026400f0d18c401fe5ff6df646734676670660f01c36666450f17720d14111d54111d00") 03:52:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:52:46 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(0x0) 03:52:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:52:46 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:46 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(0x0) 03:52:46 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:52:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) 03:52:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") syz_execute_func(0x0) 03:52:46 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r0, 0xaeb7) ioctl$KVM_RUN(r0, 0xae80, 0x0) 03:52:46 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:46 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r0, 0xaeb7) ioctl$KVM_RUN(r0, 0xae80, 0x0) 03:52:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c12") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:47 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:47 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r0, 0xaeb7) ioctl$KVM_RUN(r0, 0xae80, 0x0) 03:52:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:47 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:47 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r1, 0xaeb7) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:52:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:47 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r1, 0xaeb7) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:52:47 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319b") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:47 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:47 executing program 3: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r1, 0xaeb7) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:52:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:48 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:48 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:48 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:48 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd0") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:48 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 160.687509][ T8964] __ntfs_error: 4 callbacks suppressed [ 160.687519][ T8964] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 03:52:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:52:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) [ 161.083397][ C1] net_ratelimit: 16 callbacks suppressed [ 161.083406][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 161.094930][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:49 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r1, 0xaeb7) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:52:49 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:52:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:49 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) [ 161.257180][ T9004] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 03:52:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, 0x0, 0x0) 03:52:49 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r1, 0xaeb7) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 161.403410][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 161.409301][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:49 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:49 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r1, 0xaeb7) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:52:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 161.623843][ T9030] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 03:52:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:49 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r1, 0xaeb7) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:52:49 executing program 4: bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) [ 162.068215][ T9064] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 03:52:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x0, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:50 executing program 4: bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) [ 162.124551][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 162.131082][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r1, 0xaeb7) ioctl$KVM_RUN(r1, 0xae80, 0x0) 03:52:50 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:50 executing program 4: bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r1, 0xaeb7) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 162.363587][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 162.369881][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 162.376789][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 162.382942][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 162.511719][ T9091] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 03:52:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:52:50 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:50 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:50 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) [ 162.835705][ T9120] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 03:52:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:52:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:50 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:50 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x0, 0x0, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 163.171984][ T9147] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:51 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:51 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 163.499551][ T9167] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:51 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") [ 163.776760][ T9183] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:51 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:52:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:51 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:52:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 164.070521][ T9207] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:52 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:52 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, 0x0) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:52 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000180)="0adc1f123c123f319bd070") 03:52:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x7, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:52 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) 03:52:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:53 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) 03:52:53 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:53 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) 03:52:53 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x5, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:53 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) 03:52:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) [ 165.926857][ T9353] __ntfs_error: 5 callbacks suppressed [ 165.926870][ T9353] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 166.294288][ C1] net_ratelimit: 14 callbacks suppressed [ 166.294338][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 166.305953][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:54 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) 03:52:54 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x0, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 166.401325][ T9378] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:54 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x0, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) [ 166.524267][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 166.530530][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 166.537361][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 166.543569][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:52:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:52:54 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)) 03:52:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x0, 0xa0}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) [ 166.917169][ T9421] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 03:52:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(0xffffffffffffffff, 0xaeb7) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:52:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:55 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") 03:52:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:52:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) [ 167.323395][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 167.329272][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 167.342114][ T9444] ntfs: (device loop2): parse_options(): Unrecognized mount option . [ 167.643956][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 167.650922][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:52:55 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") 03:52:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}]}, &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 03:52:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xa0}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:52:55 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) [ 167.890160][ T9478] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x0, 0xc, 0x100000001, 0x2a9}, 0x3c) 03:52:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f00000000c0)={0x20001}) ioctl$KVM_SMI(r2, 0xaeb7) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 03:52:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xa0}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:52:56 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c12") 03:52:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x0, 0x100000001, 0x2a9}, 0x3c) 03:52:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xa0}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 168.264043][ T9515] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:56 executing program 3: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) munmap(&(0x7f00007bf000/0x2000)=nil, 0x2000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f523c123f319bd070") mremap(&(0x7f0000a94000/0x2000)=nil, 0x569000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 03:52:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x0, 0x100000001, 0x2a9}, 0x3c) 03:52:56 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") 03:52:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xa0}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:52:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) [ 168.607672][ T9542] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:56 executing program 3: futex(&(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000400)="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") 03:52:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0x0, 0x100000001, 0x2a9}, 0x3c) 03:52:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xa0}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) 03:52:56 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") 03:52:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xa0}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) [ 168.929717][ T9566] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x0, 0x2a9}, 0x3c) 03:52:57 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319b") 03:52:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xa0}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 03:52:57 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x0, 0x2a9}, 0x3c) [ 169.270595][ T9595] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xa0}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 03:52:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:57 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:52:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x0, 0x2a9}, 0x3c) 03:52:57 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") 03:52:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x5, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1, 0xa0}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) 03:52:57 executing program 5: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x5956dd703a) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) [ 169.827294][ T9630] ntfs: (device loop2): parse_options(): Unrecognized mount option . 03:52:57 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x0, {0x5ab, 0x0, 0x0, 0x3}}, 0xe) listen(r0, 0x0) 03:52:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001}, 0x3c) 03:52:57 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") 03:52:58 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:52:58 executing program 1: futex(&(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000001600)="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") 03:52:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001}, 0x3c) 03:52:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:58 executing program 2: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)={[{@case_sensitive_no='case_sensitive=no'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd0") 03:52:58 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:52:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x277, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xa, 0xc, 0x100000001}, 0x3c) 03:52:58 executing program 5: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x5956dd703a) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:58 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:52:58 executing program 4: pause() syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3330f0f1a55558e16649c67c4237d6945b206c2ececb6e5f30f53d4f4acc4c3d9422bec41e6ffc441d351b4dd02000000") syz_execute_func(0x0) syz_execute_func(&(0x7f00000004c0)="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") 03:52:58 executing program 2: futex(&(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000ac0)="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") 03:52:58 executing program 3: memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) [ 170.770059][ T9709] syz-executor.2 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 03:52:58 executing program 3: memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:52:58 executing program 1: pause() syz_execute_func(&(0x7f0000000400)="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") 03:52:58 executing program 3: memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:52:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:59 executing program 5: socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x5956dd703a) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:59 executing program 3: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, 0xffffffffffffffff, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:52:59 executing program 3: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, 0xffffffffffffffff, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:52:59 executing program 3: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, 0xffffffffffffffff, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:52:59 executing program 3: r0 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) [ 171.483400][ C1] net_ratelimit: 16 callbacks suppressed [ 171.483410][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 171.495027][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:59 executing program 4: chroot(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_TSC(0x1a, 0x2) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) uname(0x0) fallocate(r0, 0x0, 0x0, 0x1000100) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x105000, 0x0) r1 = open(0x0, 0x400, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r1, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000700)={0x4, &(0x7f00000006c0)=[{}, {}, {}, {}]}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x2}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r2, &(0x7f0000000240)=""/4096, 0x1000) socket$inet6(0xa, 0xb, 0x3) 03:52:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:59 executing program 3: r0 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:52:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) [ 171.804151][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 171.810829][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:52:59 executing program 1: pause() syz_execute_func(&(0x7f00000009c0)="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") 03:52:59 executing program 2: futex(&(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000ac0)="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") 03:52:59 executing program 3: r0 = memfd_create(0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:52:59 executing program 4: chroot(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_TSC(0x1a, 0x2) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) uname(0x0) fallocate(r0, 0x0, 0x0, 0x1000100) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x105000, 0x0) r1 = open(0x0, 0x400, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r1, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000700)={0x4, &(0x7f00000006c0)=[{}, {}, {}, {}]}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x2}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r2, &(0x7f0000000240)=""/4096, 0x1000) socket$inet6(0xa, 0xb, 0x3) 03:52:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:52:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:52:59 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:53:00 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:53:00 executing program 4: chroot(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_TSC(0x1a, 0x2) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) uname(0x0) fallocate(r0, 0x0, 0x0, 0x1000100) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x105000, 0x0) r1 = open(0x0, 0x400, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r1, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000700)={0x4, &(0x7f00000006c0)=[{}, {}, {}, {}]}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000040)={0x2}) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r2, &(0x7f0000000240)=""/4096, 0x1000) socket$inet6(0xa, 0xb, 0x3) 03:53:00 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:53:00 executing program 3: memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, 0xffffffffffffffff, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:53:00 executing program 4: syz_execute_func(&(0x7f0000000600)="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") r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000580)) [ 172.533403][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 172.539311][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 172.763427][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 172.769288][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 172.775170][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 172.780909][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:53:00 executing program 1: pause() syz_execute_func(&(0x7f0000001380)="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") 03:53:00 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:53:00 executing program 3: memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, 0xffffffffffffffff, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:53:00 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:53:00 executing program 4: futex(&(0x7f0000000140), 0x0, 0x0, 0x0, 0x0, 0x0) syz_execute_func(&(0x7f0000000640)="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") bind(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80) 03:53:00 executing program 2: syz_execute_func(&(0x7f0000000040)="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") syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5c441dfd04b00c442019dcc0f11d46f") syz_execute_func(&(0x7f0000000740)="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") 03:53:00 executing program 3: memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, 0xffffffffffffffff, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x6) 03:53:01 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0) 03:53:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:53:01 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0) 03:53:01 executing program 2: pause() syz_open_procfs(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000009c0)="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") 03:53:01 executing program 3: r0 = memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) msync(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0) 03:53:01 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000140)={0x3, 0x0, &(0x7f0000000340)=""/99, 0x0, &(0x7f00000004c0)=""/186, 0x3000}) fcntl$dupfd(r0, 0x0, r0) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x20000, 0x0) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x64000, 0x0) write(0xffffffffffffffff, &(0x7f0000000880), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5335, &(0x7f00000007c0)={0xce68, 0x10000, 0x0, 'queue1\x00', 0xffff}) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f00000002c0)={0x7, 0x0, 0xff, 0x0, 0x9, 0x0, 0xfff, 0x8, 0x6, 0x0, 0xf7, 0x6}) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @local}}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000600)=0x9) ioctl$sock_inet_tcp_SIOCOUTQNSD(r2, 0x894b, 0x0) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000) 03:53:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:53:01 executing program 3: semctl$GETPID(0x0, 0x0, 0xb, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 03:53:01 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:53:01 executing program 4: io_setup(0x6, &(0x7f00000000c0)) pause() syz_execute_func(&(0x7f00000004c0)="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") ioctl$KVM_GET_FPU(0xffffffffffffffff, 0x81a0ae8c, 0x0) 03:53:02 executing program 3: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000200)="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") 03:53:02 executing program 2: syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0xd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 03:53:02 executing program 1: pause() syz_execute_func(&(0x7f0000000040)="c4e3f9614832074a2be93693980f053ef3aec4a37bf0c53e41e2e926b5c9ef45181821e0f3dfdf0000262ff342906646da4e329200d2dec43ef369a10000000004000000dc55b1e6172525000e818fb00080008080e2859e43dce18fe9cf440f69e08f4cbec5660f383dbc47e1e042f38f56c4613fc21d9053c7ab86c4213e5377000043d9497df20ff062098fc44102672767f36ab40f688030000000564105ba16f2ae66410ffe3a16286c6c0fbc7b1f000000fe8f08e4a25600b16545e09a0909660fdf53098f49609a567be289e289d866dee4b6c1f043fe022e0f63b80000000046dec43b7d0f12e40fdc3e260fe88c4200000000ca30cac4017a7fc3bb3cbb3c022f912af30f51d00000456c0f8450000000d0b62f818194d800d800dd4805c462a52b6e0bc4a17ae64295589cfea9ffffbd7c6d830045d4cb9b9b0ce42ec4636968f11e970606b2aa260f38c9ba0f0000000f485c5e2ec422e6912cb18374fb0a07c401f1eb27f247acec550caaaa4266f20f7a058bd76192f736f282928b3682f597974791000247cc47cc2f5cc4417956a299899999389f9f060f0f7979f246e16d4401a9bb000042d8fb4974ecf2460f9ca6ae8ce721c4617ddd880c0000003423") 03:53:02 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:53:02 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:53:02 executing program 2: ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000040)) pause() syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211b0d46f") syz_execute_func(&(0x7f0000003480)="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") 03:53:02 executing program 4: pause() syz_open_procfs(0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000c40)="c4e3f9614832074a2be93693980f053ef3aec4a37bf0c53e41e2e926b5c9ef45181821e0f3dfdf0000262ff342906646da4e329200d2dec461dc55b1e6172525000e818fb00080008080e2859e43dce18fe9cf440f69e08f4cbec5660f383dbc47e1e042f38f56c4613fc21d9053c7ab86c4213e537700000143d9497d7d820159438fc44155672767f36ab40f688030000000568e8e05ba16f2ae66410ffe3a16f340a6bc7b1f000000fe8f08e4a25600b16545e09a0909660fdf53098f49609a567be289c4c101dca769c90000d866ded34700c1f043fe022e0f63b80000000046dec43b7d0f12e40fdc3e260fe88c4200000000ca30cac4017a7fc3bb3cbb3c022f912af30f51d0c4227505da456c0f8450000000d0b62f818194d800d800dd4805c462a52b6e0bc4a17ae64295589cfea9ffffbd7c6d830045d4cb9bf3470faedf0ce42ec4636968f11e970606d8aaaa0f38c9ba0f0000000f485c5e2ec422e6912cb18374fb0a07c401f1eb27f247acec550caaaa4266f20f7a058bd76192f736f282928b3682f5979747910002c1045c0b47cc47cc2f5cc4417956a299899999389f9f060f0f7979f246e16d4401a9bb000042d8fb4974ec0f01c2c4617ddd880c0000003423") 03:53:03 executing program 3: syz_execute_func(&(0x7f0000000a40)="c4a2699324934a2be92d3c2e436690980f05c4a37bf0c50141e2e9c441f75f345f6695f2144043432f430fed29660f38463da16379637902000000c46181d410c461dc57b1e6250000c482514654fa00a1e2853b9ecf491e2f4cbec5c54d0f2c718f56eecd1414ded9c4c1bd71e4000f1a047bc483695db781c7000032477edc66400f38299a59000000effde6af51090916410f3a16288866400fc5c8f26641ea0fc1e430e430609b5687660f3801a700000081420f5527c044a0ffefffff7dc1f347db993f000000ac8aac9c064c9ce34cecf241a7c4e2f9db4c8dfe3e3e670f78cddccac4817c109e00000100c4c1fd28580546464646c8c89ad0f3ab0b6fc46726abd29d989836646466264683b9080000000d5dd62e440fdd064b2bb2c7c7afa20f6baf00c4e399c4811815a0a2d70000d4410f34c5c4e14163bbf9ffffffc4a21908eebfbf58ededc4225996c937e5c5970f80442654022929ce045c01b147ccccccaec4a3f97dbe00000000058f09909bd6c401e859810000000080200e0f4401a9b0001ac40149748eecd5440f119c9c96cf00005ac4a27508313bce") r0 = memfd_create(&(0x7f00000001c0)='-B\x8e\x12I\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc/w\xee\xa9\x8bCc\xad\x89\x97k\xde\xdc\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\x01\x00\x00\x00\x00\x00\x00\x00\xf7\xd6\x1d\xa1\xce\x81\x19\xea\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(\x00\x00\x00\x00\x00\x00\x00\x00\xf3\xea\xcf\xfe\x1ap5W\x8b\x89\xc1\x06?N\x14+\xe6\x1d\xb1>\x11\xee\x90\xb3$\xd4=7\x1b\x13\xf0m\xf6\xc4\xfd\xd3\x00\xa6\xed@\f\xd5T\xc4\x87\xf4\xfb9\xb6^\xf3.\x7f\xd3?\xf5\xea\xba(\xbd\xafI\xe7X\x0e\x82\x9b\xc1\xa7\xb4k\xb2\xdbo\xe3u\xa9\xb7\xd9\x85\x14\xe9\xa6\xa3Y\xf7v\xa0\x8b\xc8', 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) 03:53:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000680), 0xfffffffffffffdc9) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) 03:53:03 executing program 1: semget$private(0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x0, 0xb, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) bind$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0xd) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/igmp\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000240)) write(0xffffffffffffffff, &(0x7f0000000080)='C', 0x1) 03:53:03 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) lsetxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000080)='y\x00', 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bd070") lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', 0x0, 0x0, 0x0) listxattr(&(0x7f0000000180)='./file0\x00', &(0x7f0000a6af01)=""/255, 0xff) 03:53:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 03:53:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dc86055e0bceec7be070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_MP_STATE(0xffffffffffffffff, 0x4004ae99, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)=ANY=[@ANYBLOB="14bc42000000000000000000000800000900de56b5000000000800000000080008000100000008000500ac14141b080003000100050f01"], 0x1}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00ff04462019d9476a25"], 0x1}}, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, &(0x7f00000002c0)="b8010000000f01c166b8e2000f00d8b9800000c00f3235004000000f304a0fc75f20c44379608d00000100f22e0f01ca67440ff6143f66ba4000b846c95182ef0f01cf400f01df", 0x47}], 0xaaaaaaaaaaaace6, 0x0, 0x0, 0xeb) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000010000/0x1000)=nil}) ioctl$KVM_RUN(r3, 0xae80, 0x0) delete_module(&(0x7f0000000000)='/dev/kvm\x00', 0x200) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000004c0)={[0x4, 0x3, 0x49, 0x8, 0x7, 0x0, 0x1, 0x4, 0xc37a, 0x1ff, 0x4, 0x8, 0x2, 0xfffffffffffff001, 0x8, 0x4]}) 03:53:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000000240), 0x5c3, 0x5956dd703a) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02070009020000000000000089da0000"], 0x10}}, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept4$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) write$UHID_CREATE(0xffffffffffffffff, 0x0, 0x0) 03:53:03 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000013000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000080)="0f320f01dff0835c1f0f36260f01c3bad004b08aeeea00002900263e64640f3acca5e70017ea0f00004066b9800000c00f326635000400000f300f20d86635080000000f22d8", 0x46}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xfffffffffffffebc, 0x0, 0x0, 0x1a0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:53:03 executing program 1: r0 = memfd_create(&(0x7f00000011c0)='^mime_type$securityposix_acl_access^!em0@@\x00', 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x51, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000000140)=""/79, 0x71b}, {&(0x7f00000001c0)=""/4096, 0x160d}], 0x2000000000000108) [ 175.943272][T10023] kasan: CONFIG_KASAN_INLINE enabled [ 175.948837][T10023] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 175.956928][T10023] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 175.965352][T10023] CPU: 1 PID: 10023 Comm: syz-executor.2 Not tainted 5.1.0-rc7-next-20190430 #33 [ 175.974467][T10023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.984546][T10023] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 [ 175.990279][T10023] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 175.990322][ T3879] kobject: 'loop3' (00000000c02006c7): kobject_uevent_env [ 176.009892][T10023] RSP: 0018:ffff88805fb7fa00 EFLAGS: 00010006 [ 176.009905][T10023] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000a21b000 [ 176.009911][T10023] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 [ 176.009918][T10023] RBP: ffff88805fb7fb10 R08: ffff888097886300 R09: ffffed1015d26be0 [ 176.009925][T10023] R10: ffffed1015d26bdf R11: ffff8880ae935efb R12: ffff88805e4900ac [ 176.009932][T10023] R13: 0000000000000000 R14: ffff88805e4900b0 R15: ffff88805e490080 [ 176.009942][T10023] FS: 00007fad98cb8700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 176.009950][T10023] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 176.009957][T10023] CR2: 0000001b2e324000 CR3: 000000009ca91000 CR4: 00000000001426e0 [ 176.009967][T10023] Call Trace: 03:53:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) 03:53:03 executing program 1: r0 = memfd_create(&(0x7f00000011c0)='^mime_type$securityposix_acl_access^!em0@@\x00', 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x51, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000000140)=""/79, 0x71b}, {&(0x7f00000001c0)=""/4096, 0x160d}], 0x2000000000000108) 03:53:03 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x9cffffff, 0x7, 0x0, 0x1}]}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) [ 176.009996][T10023] ? emulator_read_emulated+0x50/0x50 [ 176.010021][T10023] ? lock_acquire+0x16f/0x3f0 [ 176.100226][T10023] ? kvm_check_async_pf_completion+0x2d8/0x440 [ 176.100567][ T3879] kobject: 'loop3' (00000000c02006c7): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 176.106394][T10023] kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 176.106410][T10023] ? kvm_arch_vcpu_ioctl_run+0x425/0x1750 [ 176.106426][T10023] kvm_vcpu_ioctl+0x4dc/0xf90 [ 176.106440][T10023] ? kvm_set_memory_region+0x50/0x50 [ 176.106457][T10023] ? tomoyo_path_number_perm+0x263/0x520 [ 176.106482][T10023] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 176.131687][T10041] kobject: 'kvm' (000000008a893836): kobject_uevent_env [ 176.132909][T10023] ? __fget+0x35a/0x550 [ 176.132932][T10023] ? kvm_set_memory_region+0x50/0x50 [ 176.149736][T10041] kobject: 'kvm' (000000008a893836): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 176.156555][T10023] do_vfs_ioctl+0xd6e/0x1390 [ 176.156576][T10023] ? ioctl_preallocate+0x210/0x210 [ 176.156590][T10023] ? __fget+0x381/0x550 [ 176.156608][T10023] ? ksys_dup3+0x3e0/0x3e0 03:53:04 executing program 1: r0 = memfd_create(&(0x7f00000011c0)='^mime_type$securityposix_acl_access^!em0@@\x00', 0x0) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0, 0x51, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='smaps\x00') readv(r1, &(0x7f0000000080)=[{&(0x7f0000000140)=""/79, 0x71b}, {&(0x7f00000001c0)=""/4096, 0x160d}], 0x2000000000000108) [ 176.156623][T10023] ? nsecs_to_jiffies+0x30/0x30 [ 176.156641][T10023] ? tomoyo_file_ioctl+0x23/0x30 [ 176.156663][T10023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 176.210096][T10023] ? security_file_ioctl+0x93/0xc0 [ 176.215234][T10023] ksys_ioctl+0xab/0xd0 [ 176.219418][T10023] __x64_sys_ioctl+0x73/0xb0 [ 176.220342][T10038] kobject: 'kvm' (000000008a893836): kobject_uevent_env [ 176.224025][T10023] do_syscall_64+0x103/0x670 [ 176.224045][T10023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.224056][T10023] RIP: 0033:0x458da9 [ 176.224070][T10023] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.224078][T10023] RSP: 002b:00007fad98cb7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 176.234818][T10038] kobject: 'kvm' (000000008a893836): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 176.235605][T10023] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458da9 [ 176.235614][T10023] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000006 [ 176.235621][T10023] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 176.235629][T10023] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fad98cb86d4 [ 176.235645][T10023] R13: 00000000004c1d42 R14: 00000000004d4550 R15: 00000000ffffffff [ 176.245431][ T3879] kobject: 'loop1' (00000000e9d3f31b): kobject_uevent_env [ 176.265046][T10023] Modules linked in: [ 176.265069][T10023] ---[ end trace a50fdcaae5ef76ac ]--- [ 176.265090][T10023] RIP: 0010:vcpu_enter_guest+0xbcd/0x5fb0 [ 176.265104][T10023] Code: 48 c1 ea 03 80 3c 02 00 0f 85 6f 48 00 00 49 8b 9f b0 03 00 00 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 78 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 39 48 00 00 8b 5b 78 31 ff 89 [ 176.265111][T10023] RSP: 0018:ffff88805fb7fa00 EFLAGS: 00010006 [ 176.265122][T10023] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000a21b000 [ 176.265129][T10023] RDX: 000000000000000f RSI: ffffffff810cd7b2 RDI: 0000000000000078 [ 176.265136][T10023] RBP: ffff88805fb7fb10 R08: ffff888097886300 R09: ffffed1015d26be0 [ 176.265143][T10023] R10: ffffed1015d26bdf R11: ffff8880ae935efb R12: ffff88805e4900ac [ 176.265149][T10023] R13: 0000000000000000 R14: ffff88805e4900b0 R15: ffff88805e490080 [ 176.265159][T10023] FS: 00007fad98cb8700(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 176.265166][T10023] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 176.265174][T10023] CR2: 0000001b2e324000 CR3: 000000009ca91000 CR4: 00000000001426e0 [ 176.265189][T10023] Kernel panic - not syncing: Fatal exception [ 176.352931][ T3879] kobject: 'loop1' (00000000e9d3f31b): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 176.365949][T10023] Kernel Offset: disabled [ 176.455742][T10023] Rebooting in 86400 seconds..