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", 0x1000}, {&(0x7f0000000280)="a65ebb5aff6ea6bb8638b56bec8d1ab73b385347f6c5ebb3acc2", 0x1a}, {&(0x7f0000002340)="83087900e518d5633996e30073ab773a5ac55efaba30971ef5f06274a430f24a2fff6d17f45f63c9d285c8a8676d0283caf1dafc64f45381400b070496e2d5c8c625f32634de19cc3b79cd7e1500d8b9d75be8ccdae2c642a7e5b03b3935d6eb7b038213fb8a8c07531a868f4a2097ab90aee9e6d70870a1d8cf990b43398ea580cc089eca314a8b4a061c4ce9ec931c2e8c74a06b0e8526ff", 0x99}], 0x7, &(0x7f0000002480)={0xe8, 0x119, 0x8, "f5b5eab7187d16b79089edc159b738b5d19b7e23d056bead35fd7b2ffa1ab8d7e3e8c5d63a3c34b019eb3564c81829d8846d5d9d1dbba4d47b565f9a3bfd606233ed5ab92fd9ab87529959ac69f3db65a81386051b4221285cc7882c9a7e51856d368ed485a16e5ca3cdf119fb3a30b7b10d49466b0871aae134235896bdff3f4014b47669d89f1a1fd743a9d5b99f217aca448745e60c75110f57a6efe287aa9283a8178e03617888b4a60bffabf380a77b183f134fa97a44b23af424a555e137b990c252624ab1bd5b6fad05d7f31cb3fc73909e2a79b2"}, 0xe8, 0x1000}, {&(0x7f0000002580)={0x27, 0x0, 0x0, 0x1, 0x4, 0x0, "9722e3d0ee0bf0b9eed121bc7500967f755ac9a706a9d8ab3803cae11e9b3e2e4c7513d3b3be2157eb3e4791bdfdbe8c4243d63fbaf4d929f90570a25bf98b", 0x12}, 0x60, &(0x7f0000002c40)=[{&(0x7f0000002600)="50692415807f5b1c47aa1ab9a4a3394eaadcb16a7c6605bafa658ea9d646ca3b3d1f6730b7a2cbbc1df89733202149c4fce5f918071d16a2a8ee174083ab5ae71341be30e1", 0x45}, {&(0x7f0000002680)="315b234e3bb53d51ff1bc47c175b7c7a38ea42cb1ec2e0fd9c715d2a1adbf2894894cb3bc56d412137ae85ff910b550ab4ae2214c255f17e0c00531e5f857856ae8024c7067aa3088a6f1a1ccb52807dcef8584791e6b47d8a74dd0d3060a02d6ca93726c3c190bf0e8bd690b3812ada50d5fabea520e045ed33e9c77105a91396f1a1f52706f8a8f003199370e456af59c35f3b8324618dae4a2814247e84758c8dbb632f78d5363dcac62b0d7421cb05faf576e2f204be8986ff9fede6ca1cc6d9d94b2f4eafe18c896d12ee753545d35f283171352c270f0493e91f4d0183ddcbbc4d560b44466a37391f079b8a909357", 0xf2}, {&(0x7f0000002780)="3a0c7f29c4fd23f18c8a733fc6aabb14ff02b9824e3e1e9214d2d7ac6035ced58d4e97fe690e9fe1bf6e027f542d63f47b8a692a37f0afaf8811805dce353998693a323b32e9b6b742199f5020b694bea38a14d6a2bd535e9f9a2dcc1859c4e12552e7b16028b93e461dc40413df65bca3f60c23795665b8c3e44845fbac999e4b7536ca0d37c9105afc421a6324a438ead31b3a12d83ea9a9be3ad5e953eba6e5626756f6da0cb024e0c93ff8edd8ed7ce4e590bf159461d1aa21a5aeba991e25c03c19a74a693c1b897cf9458b167e6f07dcbf841d2283bdd5d50d7fc7aa6cecc3af77", 0xe4}, {&(0x7f0000002880)="db957bde1e7e982cfb5253c8663d5009fdf301c0a434b7fb94e8c84204f77a7df547557f69bc513b3d8695050a2846d567e852c7ed30a69db2c0455223a764be9eee311a82c61ad9710fdbf873afd38b05e67969680efd03aabfb6c7899167a8517a452f79f501565ae12d3717354bf1d3cde4c28d68603a40198b9e5595d29f38db92cc88ef6694791f77510275dc4014bac056af47dffe289da1927d81a37140aa4c2cdd10367206e06cade54f0dc8d56665b1f13c77e6f92968df1b8d3138c321ff6dbafab159", 0xc8}, {&(0x7f0000002980)="ecd77012a65f30a1afc2983f7fbfa2f96e596ecc46f402ff17cbdcd57d5baee4cfc7ef38fdeb66f5d952f30431365eb4f50fa94c8e272dd16cc7af75efb16495b4b3909f6fac3145d5a27db91b515ddf02128e52758881688e4e5f98e6736a1e060dcb2287f216135a7a5f33342d41451e8b0ac833bb310518a0c67cd5ec61a2d1db90b95334d4340479abf88b0f9e37ebfd0799f2d9076a5635255b530fef0621ffc3b16f43dc0bd887aec1e690676057fc15583d7d5e4124893824753942d30eed94b465b40bb23e2dbdbe3c22c8b675bb1114beff83bd3faadcabd479b207cbca6e3153f9522aaafa134ace", 0xed}, {&(0x7f0000002a80)="a8dfce05c40bee05b5d2a8d1368a833e3f82", 0x12}, {&(0x7f0000002ac0)="d85e4ecc8513be927fb8329e4d002a51ec7df5a6c3a1fefc23b5ae1de8b0d38409d84b4412777573c9d1e5afddffb84958e7a90f3d77973d1c0a79ef07e8e7f538e667a7551a9a1cd413ccebaa8d9d4f938dfa84ce9055a797354270c12823b44632a30d3c08f9b60c34a637ae57355ea27c930ca00675b1a3351d05a3a92d4bf1900712986871e9c2af1119ddda59", 0x8f}, {&(0x7f0000002b80)="b3528311d7f3de62669d294e1096e6dac80f8bec20ef3cd8310b197a41a6b6985c7595d8e9fe6d256d6b7f42ebbf25d0252e552fd5d6367f94f6b552535253e52535054797304bfdc02a258e9c1aa579ed264ea7e05693307a905d311682cd3e81a39ffc69a5af09782add2bc0d892efb0931e32e2114f162294d45578196a6a2ad7bceca738b2f60a34132a403f0badd4a4eda39f279ac4482c9e8b21142f5505285548ea7c54357ecaffeac78dafbd", 0xb0}], 0x8, &(0x7f0000003540)={0x90, 0x8c7658b4dfba0131, 0x1, "3820ab17375321a106740066c200a45bbc34fd80353cbd1d0e10154990a49bdf8e6e17b645496eea11865565f1036e27e65420c59856e600a437ac0f582a2caef0385579c2fccec20d57224e5763c4aa7c4905c62e8655cf3d2c2850be65782c7bc398184e68166f23d394595bde3fd63b0133bdcaf3d6d4c80c1740"}, 0x90, 0x8000}, {&(0x7f0000002d80)={0x27, 0x0, 0x1, 0x2, 0x61, 0x1, "752110d0224ba9fbef459a5279540ea0595fd917085261e2f90c1060744035683d37d31439cb42a81c5322240f2888ba2c241da958947a28c900686cc54528", 0x80000000}, 0x60, &(0x7f00000032c0)=[{&(0x7f0000002e00)="df1b665aff003b9f16c5bd66de5e9905afd27bb5736b431debe915a5c46c6d5dc8f8096604d9346099f3b899604da4860e217b75db005e1c0a33caf7ad8d4cb21377f002895ce660854f264ba0e06ddf30ad086ea7935d98e153b68947321596e5703be06952e95c2a2c361a420e5248cbdc93c1b354e625e4c45e922e26a04f2f09cbbb5ca51f69dadfc900928d960c9aa4b051d793dc4a79af4c5db8e8a2a3946738f93d812e66bbc77149f22d4ae0048e38dbda6eb0b8f0b1093520120c4155674fea1f5b0e6c9938c777a56bf3", 0xcf}, {&(0x7f0000002f00)="f2bb4eace03c604f1f7a7cdfb72bf58d0d5c016969a019de9be819d9617bdb0e124952ae9f2caa74c7c1929153e2428ebab0ee3b2761ee0b495332ed43b052ad5ae7fe9ffca545c6ce3691bb8959de41c22c48919e262f", 0x57}, {&(0x7f0000002f80)="3a98c1e5763263343dc0c6dc984beac3ce7478e5c519ce4f19c8a3fe43a4f712234c196dc742ccf62adea4d0dcda85a515a0cb356ddf6a", 0x37}, {&(0x7f0000002fc0)="48bc2a48d8a01ec46b3541fda88f020b595d5d90ee37be9eca86454b11d07ed063f63a2e55032e0db50f67e64e142a46b7a6be40d0cc6eba73eb2c5f3c0637d73814f78908778a67d8daf80d2a35c7ff8f8689091fd50d9caa93e6cabcbf30aaabdde041706ead4d8ecfda6db5b8008f7fe200f293a5b67ca7f5c97322e6922374ed53a0026473f2282dd2e6b8f623f73b6e6252b6ec58a04806030295fce833ac73d379f7b17fc450d557649e8ad239e4235034a59ccd86fce40ab28671ef5000df9e52d72eabd1f1f2961514d66513d44642825e234763217c129a500c8cd23befa699b45688149d602688e1bbce9a611a181c", 0xf4}, {&(0x7f00000030c0)="bd1cf8892d9cccf6667ebb969a406403afa57a07e995dd0d4c1233a53fee9c0d8b21332e", 0x24}, {&(0x7f0000003100)="69376cf25116294f846324d9a8c1c1edd0dcec6e29052502907ac0c98658e8d77011a73cf5e58b71addc9aa49835cde49995701a68ae134faa9ffdbe4a34ee9487b15cb9b3c02361e35fe5756f798b6f1417cf90a23fd49f954e9dbed8a528125d1ff85ac1caf326334d88419a79c4f97a6e6eee9da0feba4c1596bc950adff678525ef636d39ba819a2814d943cdd706a99eb9d24dcae18c38b06a63ca74ebee6e1a67d5b17ab4a07c11cb1", 0xac}, {&(0x7f00000031c0)="d41dd08d612ebecc530e62fce680a472163fceb3ee25de6b77fda8dffc8a24e4a3bb2cffe6636e5a47e8dcf6e0efe039d0f6f6fc502561707875686e6ea5e3159a6cf20bc38264d0d21f8d0884bbca15dd6fac72416ea4772835ce7198669280a06d2f13043e3bd9f8c4fc48ea", 0x6d}, {&(0x7f0000003240)="dab674db30132117484fa9e8870b534e", 0x10}, {&(0x7f0000003280)="e283167b8ba1117811078402d7d7d8e1519a62404f", 0x15}], 0x9, &(0x7f0000003380)=ANY=[@ANYBLOB="600000000000000011000000050000000940770d0abef74302ad4a5d05a426ba535914c5b79a929761e0a638b5a0d780f4d1b2826578c018882125f08fcac03fa7f507d9e8ff55a8a945c33667170000"], 0x50, 0x80}], 0x3, 0x80) 09:01:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multip.ier=0']) 09:01:55 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) ptrace$peeksig(0x4209, 0x0, &(0x7f0000000140)={0x3, 0x1, 0x6}, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}]) socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000600)=0x8) r5 = semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT_ANY(r5, 0x0, 0x14, &(0x7f0000000540)=""/97) semctl$SEM_INFO(r5, 0x0, 0x13, &(0x7f00000001c0)=""/111) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000080)={r4}, 0x14) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000000)={r4, 0x4, 0x8, 0x401}, &(0x7f0000000040)=0x10) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 09:01:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:01:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multip/ier=0']) 09:01:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$USBDEVFS_DROP_PRIVILEGES(r2, 0x4004551e, &(0x7f0000000000)) 09:01:57 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="666d61736b3d30303030303030303030303030303030303030303030302c64697361626c655f73700104000000000000636173655f73656e736974697665"]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000040)='cgroupcpusetproc\x00', &(0x7f0000000080)='./file0\x00', r3) [ 826.489216][T13467] __ntfs_error: 26 callbacks suppressed [ 826.489236][T13467] ntfs: (device loop1): parse_options(): Unrecognized mount option disable_sp. [ 826.491646][T13471] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_zone_multip/ier. [ 826.603799][T13469] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:01:58 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:01:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:01:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 826.703594][T13485] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_zone_multip/ier. [ 826.716379][T13467] ntfs: (device loop1): parse_options(): Unrecognized mount option disable_sp. 09:01:58 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="666d61736b3d3030303030303030303030303030303030303030303030b1f8d4b361626c65687370617273656e6f2c636173655f73656e73697469766500"]) 09:01:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:01:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multip0ier=0']) [ 826.829408][T13483] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:01:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:01:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:01:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:01:58 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)=@known='trusted.syz\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) get_thread_area(&(0x7f0000000100)={0x40, 0x2486e17543d9b6f6, 0x2000, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1}) 09:01:58 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:01:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 827.076959][T13513] ntfs: (device loop1): parse_options(): Invalid fmask option argument: 00000000000000000000000±øÔ³ablehsparseno [ 827.137569][T13525] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_zone_multip0ier. [ 827.166674][T13513] ntfs: (device loop1): parse_options(): Invalid fmask option argument: 00000000000000000000000±øÔ³ablehsparseno [ 827.279774][T13544] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. 09:02:01 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:01 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x2200, 0x0) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000140)={0x1, @raw_data="9f63f300ccdb0b04aa6981b679c229f38138341f8264cf32529686c806b6826f27b3433b35312a59c4d6d1181e67c9c61c2290edb1d524bf8a2d1425cda44207b8c1ed41cadf1f3706b5048fe68647098f180f6125620b2bebd160611b3b6fc38464241f2f2bb9fd8ac3152588847f2100487d46df2451c71a7778025400a2f6f4c318154529b94b196a302895bb072acfd9296a00cad4f9ca4b67a6e24b17edbd3fa53f79076ea378b2aaeb7c5fc834249978491aaaab89f26e26cd1a1a790ec2300ada2f6719dc"}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="664d61736b3d300eee4c6f300e3030303030303030303030303030302c64697361626c655f731484b9a97570617273653d6e6f2c010000000000000073697469766500"]) 09:02:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x106000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r6}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r4, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00', r6}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000100)={{{@in=@remote, @in6=@empty, 0x4e21, 0x0, 0x4e23, 0x800, 0xa, 0x20, 0x80, 0xc, r7, r1}, {0x3, 0x85d, 0x0, 0x7ff, 0x7ff, 0x7, 0x3}, {0x9ce, 0x8, 0x8, 0x7fffffff}, 0x7fffffff, 0x6e6bb0, 0x1, 0x0, 0x0, 0x2}, {{@in6=@loopback, 0x4d5, 0xff}, 0xa, @in=@rand_addr=0x7, 0x34ff, 0x4, 0x0, 0x3, 0x8, 0x6, 0xf866}}, 0xe8) 09:02:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multipHier=0']) 09:02:01 executing program 1: syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="666d61736b3d303019303030303005303030303030697361626c65a7ebfa610f9b6a2f70db36d35f7370617273653dbe03717258238a5d73656e73697469766530883ce2f033ba49bc7c053e4aaa28b2967e4096a99ade8903cb153ef6bcb1eaf919d54735a46b5c6ebe710504cea4907907483161a4c8adb61543842845cf5f1e259e6834024d52845941f3f9f474feb0a8ded3e5e34c0daf4f973fa4304c9dc8f60eda805d9c0957c3f5ec3a2bf5693162d8061508c5c9355536093e46e9341cb8b4ac52d5acaf6bff9852d0a530757363e599b4295d60e394da76e7b3c59dc39f7ae05f132f32f39462d63d4ce6958a47e732e2ec632e413daede7b25212e72bf6908b8746b8dcbe548419a3673f21d19da38eb4de6ccd37999ba7751b6a01496ddb541681c15c72e3dbfb464ee50404bb40bc63100e03c145cce37b18d87628c858aacaacd39379ea08fb45f7edf3407fc21180379af14418dac458dbf96797e082722e81309a7d686bb0fc31d4b5fea6a36ed78a98cc7fb506b"]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000), &(0x7f0000000080)=0x4) 09:02:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multipLier=0']) 09:02:01 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@in6={0xa, 0x4e21, 0x4, @rand_addr="af8e7291e131be49d5f1697246ca43d4", 0xccc1}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r2 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000280)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x54, r5, 0x7311c4e0b4cc970d, 0x70bd27, 0x25dfdbff, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x5}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x3}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x958f}, @SEG6_ATTR_DST={0x14, 0x1, @local}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000800}, 0x80080d0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="4c0000000214030429bd7000fbdbdf25080044008ee7fa97182ece11ef61472532c4290b994697c364cfa8772f2b40269c95ad4a75d49c9dfb0b6c8c4ccdef89e8dbea22e20afa5bf61f338a3fda40d09bc3c80b8c1225010e5b", @ANYRES32=r2, @ANYBLOB='\b\x00D\x00', @ANYRES32=r4, @ANYBLOB="0900020073797a320000000008004400", @ANYRES32=r7, @ANYBLOB="080001000100000008000100000000000500540001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x8040}, 0x20040080) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r8 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x103600, 0x0) r9 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r9, &(0x7f00000002c0), 0x40000000000009f, 0x0) connect$pppl2tp(r8, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, r9, {0x2, 0x4e22, @broadcast}, 0x3, 0x1, 0x1, 0x4}}, 0x26) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) 09:02:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multipXier=0']) 09:02:01 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept$alg(r1, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="666d61736b5b022d119ebc03165497d6213d30303030303030303030303031303030303030303030302c646973616205715f7370618973653d8aec8d5d7a"]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$UHID_DESTROY(r4, &(0x7f0000000300), 0x4) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) r5 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) sendmmsg(r6, &(0x7f0000000280)=[{{&(0x7f0000000100)=@hci={0x1f, 0x3, 0x4}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)="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", 0xb}], 0x1}}], 0x1, 0x40000c0) pidfd_getfd(r5, r6, 0x0) 09:02:02 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000040)=0x9, 0x2) 09:02:04 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(r1, 0xc0884113, &(0x7f0000000180)={0x1, 0x8, 0x8, 0x5, 0xffffffff, 0x3, 0x0, 0x8, 0xfe0c, 0x9, 0x3f, 0x5}) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0x37, &(0x7f0000000100)={&(0x7f0000000080)={0x12, 0x5, 0x1, 0x5, 0x0, 0x0, {0x2, 0x0, 0xa}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40800}, 0x40041) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) 09:02:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multip\\ier=0']) 09:02:04 executing program 1: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000040)={r0, 0x61, 0x34}, &(0x7f0000000100)={'enc=', 'raw', ' hash=', {'blake2b-512-generic\x00'}}, &(0x7f0000000180)="ac3855dbe6cd43517e9758bb05ed97a78953b5c9801a6b9bdd91c318c9a238f0680c526e5cadd3f0e15971f046e727dfee983c8c787bcc26ba023dcac5e9af365d227628bc6588778289a1ceafd78b90ba381e1fe7a4e5332c5b326bfc0ccdedba", &(0x7f0000000080)="7ee7e286ebba2e2ad5ee9560e53bbc0ca6dff260b6c7f7e782a9c2570c9b08985fdd02ede76ad120bccddfd52e0cfe5ebdca5dbf") syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$smackfs_ptrace(r2, &(0x7f0000000240)=0x1, 0x14) 09:02:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 832.965188][T13674] __ntfs_error: 26 callbacks suppressed [ 832.965197][T13674] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_zone_multip\ier. [ 832.969932][T13677] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 832.998528][T13677] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000000 [ 833.027004][T13676] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 09:02:04 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) r4 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000080)={r5}, 0x14) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000100)={r5, @in6={{0xa, 0x4e22, 0xfffffffb, @rand_addr="a30a16d0e99308589b1cdecd63ddae0d", 0x8}}}, 0x84) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) syncfs(0xffffffffffffffff) r6 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r6, &(0x7f00000002c0), 0x40000000000009f, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r8}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) sendto(r6, &(0x7f00000001c0)="324caabdc4d6c5b4f9d44bafdc0ef86a617a590f644c92212af172ee11a7663d485309de53f94bc1057a3c557b591505927f4e59c4140e736aab56b6cb747a677c15dc57555e58c37c385bc16c7bff", 0x4f, 0x4000, &(0x7f0000000240)=@xdp={0x2c, 0x18, r8, 0x39}, 0x80) [ 833.074632][T13695] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_zone_multip\ier. 09:02:04 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:04 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="0ac42101f2cf6ea27684e33d0d3fca4001d2000000a3040000000000c9862e2fc1", @ANYRES32=r1, @ANYBLOB="14a497525cb1c97b9d000000000000001400060001800000740000002000000000000000"], 0x40}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x15, 0x80005, 0x0) ioctl$SIOCRSGCAUSE(r3, 0x89e0, &(0x7f0000000040)) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x9, 0x0, 0x0, 0x44800, &(0x7f00000002c0)=ANY=[@ANYRES16=r2]) 09:02:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiphier=0']) [ 833.299561][T13701] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 833.338654][T13701] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000000 [ 833.353692][T13708] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_zone_multiphier. [ 833.536141][T13722] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_zone_multiphier. [ 833.656083][T13713] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. 09:02:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiptier=0']) 09:02:05 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f00000001c0)=0x1) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x4, 0x70bd26, 0x25dfdbff, {}, [@NL80211_ATTR_SCHED_SCAN_RSSI_ADJUST={0x6, 0xf7, {0x60, 0x2}}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000840}, 0x4) 09:02:05 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0xc) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) syz_mount_image$ntfs(&(0x7f0000000280)='ntfs\x00', &(0x7f0000000200)='./file0\x00', 0x3, 0x0, 0x0, 0x1008080, &(0x7f0000000240)=ANY=[]) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x80020000) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) sendmsg$NL80211_CMD_GET_WIPHY(r6, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f0000000100)={0x1c, r7, 0x709, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x11a}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r5, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r7, 0x20, 0x70bd25, 0x1cdf, {}, [@NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x8000}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4040899}, 0x40000) [ 833.961149][T13756] netlink: 'syz-executor.1': attribute type 282 has an invalid length. [ 834.140940][T13756] netlink: 'syz-executor.1': attribute type 282 has an invalid length. 09:02:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multipzier=0']) 09:02:07 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) 09:02:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) 09:02:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multipl%er=0']) 09:02:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:07 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_STAT_SET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="200000e20f140b02ae8632928c62c42508004f00030064c4bb3f63a12c7850a1"], 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x28040001) 09:02:07 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYBLOB="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"]) 09:02:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multipl\\er=0']) 09:02:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:10 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x4000, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x933) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) 09:02:10 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYBLOB="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"]) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0xffff) msgget$private(0x0, 0x3e) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x4800, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000080)=0x1) 09:02:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multipli%r=0']) 09:02:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 839.084900][T13873] __ntfs_error: 25 callbacks suppressed [ 839.084908][T13873] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 839.100105][T13875] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 839.110591][T13876] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_zone_multipli%r. 09:02:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:10 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="666d61736b3d30303030303030303030303030303030303030303030302c64697361626c655f7370617273653d6e6f2c636173655f73656e7369746976653ffde5c3eb0ebd561cb6eca7c86dc81503e3"]) [ 839.166602][T13875] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000000 Á¦k»T‚Ï€`õÛŒŠì£#ÿl [ 839.338951][T13898] ntfs: (device loop1): parse_options(): Unrecognized mount option case_sensitive?ýåÃë½V¶ì§ÈmÈã. [ 839.353044][T13893] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 839.373793][T13893] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000000 Á¦k»T‚Ï€`õÛŒŠì£#ÿl 09:02:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000000040)) [ 839.443988][T13901] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_zone_multipli%r. [ 839.560513][T13898] ntfs: (device loop1): parse_options(): Unrecognized mount option case_sensitive?ýåÃë½V¶ì§ÈmÈã. 09:02:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multipli\\r=0']) 09:02:11 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]) [ 839.656183][T13918] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. 09:02:11 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplie\\=0']) 09:02:11 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x35, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES16=r0, @ANYRESOCT=r2, @ANYRES64=r0, @ANYBLOB="061c7f13047fc218fa51800e31180955162b68ddd2cd8ad06e5a912f2693c6b1b67dea5f63c0f5d901b7ee40e69e8c4391a9d1f0d871f3c6f6c3411dc963ff19de47b5bb1299853207e0eedda04d07b6c39dc78833fa4b439b4e456725c2d07f4ae81aa6eee7a2d97afea1ee144ef3d7ee5ac157bfcbb81ce8b7bc5a113c0de973fc3e34014b4792605ad14f"], @ANYBLOB="279af27fdb469ff42fb3e0b1d47ee15e51676ca9cf8e52d47a071b4844e2305b7d69165ffb16596abc8f7ebec1fa23703eae6caef13bcb4c47d36b0e98fd78fff9db5ac48cf8ff2b89a479120c2848ec"]) 09:02:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r4) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r6) r7 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r8) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000080)={0x3, 0x9, {}, {r1}, 0x72, 0x8}) r10 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r10, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r11) r12 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="666d61736b3d30303030303030303030303030303030303030303030302c64697361626c655f7370617273653d6e6f2c636173655f73656e7369746976653d6e6f2c6769643d7fa4515d158da48b6ab53697dd42c6d4db76f2baffa814cb6a491f6b4fa5032fb067f55aadee70cf8809ab5ba39da1f63689f6e28783ff4507859aa5", @ANYRESHEX=r13, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="02000000010000000000000002000700", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=r4, @ANYBLOB="02000100", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="02000000", @ANYRES32=r9, @ANYBLOB="02000500", @ANYRES32=r11, @ANYBLOB="040003000000000008000300", @ANYRES32=r13, @ANYBLOB="08000200", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="10000300000000002000010000000000"], 0x6c, 0x2) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0p0000000000001,fmask=000000000\f']) 09:02:11 executing program 3: syz_open_dev$binderN(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x800) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000100)=0xffffffffffffff88) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x000\"000000000001,fmask=000000000\f']) fstat(r0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r3) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r5) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000180)='./file0\x00', 0xfffffffffffffffa, 0x8, &(0x7f0000000740)=[{&(0x7f00000001c0)="494f4bcd4d3fb1fbdd4af5c6c46aee3cadeb13e9989fc869c9d5d62bd8d8043de4b0f426f91c7818cadccaa92ca3603e4726e0ee1e7700558be734b7f257b575cd51782443f9ebf31243b5ebe80fe4575ceff91cbb55c8b80a4785c0421c7a8a112242a27a4bc34246567c5223a08f445f36c3706ad63fcdbd7f298f2f66b3d2daaea18b7712fb6a1ccc3539efb8ff05d62d92fde33bba24307f7d6b3d120255a66b213f376ca2ab0db663d84cd5e7a80294a7f01245ce293491e5564bba9f0097a6e75350605d831cb624755de193a6e359a46ddb0e3b026eb7d7bb069a5a93c68f730f5203bebbb5557d8dd18057", 0xef, 0x240}, {&(0x7f0000000340)="017de5293fc47718dc3c091e71b4dbdfeddf2c1f86add782c79b6a04a131e3b4303f2c868eb14c62086f68b4bc3686906e353fbabf48aa638ed790373e01c7a805b9785039a45c7e4d6abe256086294f92f670500364ef72c1232742606e1ccf1ab8fdb2a68c318d0ef7093525b259ece88923208ec5a9a16351734fc80588d49cff7bf710789d14abafdbace8b69f9db7e77c6949a63c6a08feb589f44238837ee967a8acc981cb26c4e1ddaaf118e0c2ffbe0fd280eea4c4d1c5258e0ee9337cc53c3c5ea0a5e13a987793c5d52d57ebac5dfa08360b0bccfac2a059d7a1dc773bea7d", 0xe4, 0x4}, {&(0x7f0000000440)="8203d74645940af50fe5192b5b0173", 0xf, 0xfffffffffffffffc}, {&(0x7f0000000480)="cc0dca70f1c73f", 0x7, 0x1}, {&(0x7f00000004c0)="0473db70d16326e05eb29ac50b98776b31834d86aea572f4ce6e0eaa5ad39221be25076ffe9f120bcc0e1ad2f42136b23391c3f08161baacc0929a9f5789410adc514fec887913f366a089f5ccafbe3286182b9b592f5338c10cf07481126afa1a107fc11c94c8df7922e0a1d4ee1c23c2bfb5fcf893038d5257786d6b401e53b166a9a89a71b7e53b8c9ef923e90b", 0x8f, 0x1}, {&(0x7f0000000580)="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", 0xfe, 0x800}, {&(0x7f0000000680)="4c399e21f43ca3d3af71dc2de3c383679eb05003c4e67bdce81e30d5c45506508c5f92ac4b684ec7d5ee6d513b573c45f926ee2f05f028d97a0291b4f3aaf29708a35ad2527e85339c2612e370f67b7bebd8c1a7105521a3b7357f4fbfca32e4d59fbf76832148b3108c34a28c4940d4dc79b7aab9a83eb98894538dd379b729", 0x80, 0x7fff}, {&(0x7f0000000700)="7d2fb849e55fc1c74593cf0cd362fe1df2a5e05df4dfc1ffdb6a0bcea5c72835b4354b29c6c1fcad79e6f3d4bee90662a0f90bbed54b", 0x36, 0xff}], 0x3102802, &(0x7f0000000880)={[{@gid={'gid', 0x3d, r1}}], [{@fowner_eq={'fowner', 0x3d, r3}}, {@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@smackfsroot={'smackfsroot', 0x3d, 'ppp0ppp0'}}, {@pcr={'pcr', 0x3d, 0x35}}, {@fowner_lt={'fowner<', r5}}, {@fsmagic={'fsmagic'}}]}) 09:02:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:13 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESOCT=0x0]) 09:02:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplieq=0']) 09:02:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r8 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r8, &(0x7f00000002c0), 0x40000000000009f, 0x0) r9 = socket(0x11, 0x800000003, 0x0) bind(r9, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)=ANY=[@ANYRESHEX, @ANYBLOB="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", @ANYRES64=r3, @ANYRES64, @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="f7", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYPTR64, @ANYRESOCT=r6, @ANYRESDEC=r7, @ANYRES16, @ANYRES64=r9, @ANYPTR64=&(0x7f0000001740)=ANY=[@ANYRESOCT, @ANYRES32=r1, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESOCT=r4, @ANYBLOB="cfdaa9c7b5f333ef91b886c52c4b6227d9f8fe5dad3590098685b627b94848e6ae44bf2a0f0a597b5c862d89e81996e12c9a2b72d08b751d1277b75367259959bb9f9c9bdff165c908afb4fe5b44652142ae07875434aa0f57956b8e196d396965", @ANYRESDEC, @ANYRESHEX], @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRESDEC, @ANYBLOB="8df576c9928c8ffe11061629b959b6e7c53a9f3a13630c71e31eed4d0ab2f3cfafd04461f8a9ee3c28494dff839594265e96f22d11cd26bb6d54abba60fe74ae2bbb", @ANYRESDEC], @ANYBLOB="29b728aed78983ea8bf8c5e47da64fe560b768f1fab5c817c3f1906ad0785d307413a2e69efd8d77ecf03fc07ef8077de12cad20bd4ebb1ccd689c2733a576ae4466e602149c77aab4b609a82826f8b73c834cecdf896a461be62373f00e36602a9a423c1201a62d836ce3b310fe1db74662f03f7260ca365f", @ANYRESDEC, @ANYRES16=r9, @ANYRESDEC, @ANYBLOB="59e431d50970fd1e20b153becf36f37673c51c6058a6af62604aae19b3c63d5c076d507746f1541991310a215ebe149fc118d028993d10405653157b40e71f5bb2694a365f17b75eaa6cde620eee7498", @ANYRESHEX, @ANYRESDEC=r4], @ANYPTR, @ANYPTR64, @ANYRESHEX], @ANYBLOB="2654b5d752b981fd34464d7b47292e4122de120a03b15a925af8f866e6923674caf75016a3da77bf1e57b6633768cc7b10ed8a2f9589042b18e4392064f03d8bc9fddade32ac71a66eb37c287edd1d9a139dbe35343d36280c9c7b53f017326d6bfe2a55bd3c8a1fbdc9a8933275e68879d0b56168857910fc5a2649076bc864b7699048e9ff60721ef889a12f051f41bd77957657f0d5117f374031679a99b6bcfd2ddf5742a5165e2ebaeff31d1b58eacd0c5865e897bde5045a2a69ba4fa1b6b79b6656321a3dc15d819de464636a726dafb2a06814731df8e8cfff52ab2e34fc6709961bab2fe4b4b6fcf30f0149c7d53bad4adf28ffdef16ffee7b361a7b90e4058b2dfd8787c3e5f6dde63b17740b5f0d10e2b4759d63c0896ca322b4bffb736df5188d708f11493cf6bd849321a00b70e0750459f6617e4630c355cad47ec89b1df80b6b5d56f6fc2879d9f515d1b2bb77b7c4780afeba295295f438ce3707a9e7d7733eaa107b084dac8d5b1dddb7dc856ed8e4f664b8b8cc26f73dc7967fbc708e62303c6719386f6549468143e8e1e968fefa290d51a67b5edd1386c19d0ecd64eddc3695d5f6018cde08f51fd444a22e8f449e9d0caaf3654d1318f6d1904f8e9a8526978347bde29c3a211da9be7470f69e6efc02886b4ef33299a0d8f610e524969ba6c3b13b0816bc2602f095ce5295b3edeb8e589ac04fc806defce6b507a8d0c20388fd14ef17d3933db4f8510b0925ae8e85b96c4364d29db6e74168e56e384418f1e2aae5c8f736596d1774bfe8b7f606cd1429765de341abf69ff1feef2161c39332bdb39bb3a8c9697d039487f7dc6a39498108d69c5a612f37d70fc797bc6fd66eabe57a0666af67b7e50d70a8de3996d9717103ca0a92df121a3cdadaca71daec2f58fea83ca039691500d123be8ff91f87734df5e66ef1cc0ca07355d560cfe9945d287e4d52a4e04290c77ea5fe5b04f774b3b4b8d7b520187ad07b1139163fc241cdd4b0245cf818a72faa4ac90c23ce6a68d7b0ba12385e7a78288df7961578bd431f1a03084e752e463c9a0fb9da3ae4a3828c08d0f609e8a3fb96d99a8d8a6c75ce64d7a473454e73873107b62f98c9d9333f1ce42a5b72aed54b86a863ffa27a0c0968b21147fa2ca017c2a5f1d7d598bc36fcca06792f62e6f341769c45198afa50a556cb3de48eed0078c371adf3de07549ccef49af12c1fcbb261072fbc105aa7a96e402a9b85650b8ce94311ce9a3a01da1d5cd0727e0fca17669d970614357a0603cf971e96d13c48b80baf8513c326f53b5751106c2e7ab58c2199616853c7991a6983d1187e548f9a127f8885e6b5550c9cb7c5cf718f2106a8b174dfd18270b44a9ef15fd6efc9e1e256b97f956b2fe0cd868ad76c0164016b8907a0fa2b999bfb914d64a125df9e017455d0c9d0a701c5a362fa7cd26ff5bb5708ed98a2504d7324892d3298a3748de2d78f9ec54667f401efc39a2ec45f64022503fa40e8db68ab42110dd14e1f13a2f2e503bce26ed3067c90b856db73d109fe81bebf379298591ee350d2819a015c94d191d94d9c1bd2e6c540f08975e850c5c7714509851fff9416da9e416bcd5a849ebe119eead72588c3c98e0d6f9428dac5d0836ef1821cb92a6406973b8013f4e965d160a605be764ff894cf7b65cf4b48cc8c90723efbe9283898a3ff0d2a600dc2b4f6d0f1794b68c4ee2afe3607f99efc961d0cf19a387eadab25fa7829b54eda645192de7779dc2a48bab6113b5561bc35a498f5ce57ae85ebfa7398dec70d97591d6598ac14a34a01e5b9226e9cc41e2c858754567ad1a06b3d74fd301abd9670578065fdf5044e7bbed346cfb0bc4fc3124e809b218a0e632ae82dde7b0cb4a4631139d3136aaef5676387d0f611ff16b520e3f14ca92ac800b5aeb5ad711db7803d9c70fd0a8a2a6d1f147dd26346697db0e15a466df658a6a90ea239f9069e2933d0929e79526146a56b7fc4909816c3a032c14228eb9c23ff3769b1870cdd5d657ab18fa02da57d2380a9aeef4a1b383bd3ea3d634061584129699d429d695b850d3027f8d3fb09bb2ec94abaa56c2336fb8d0eb07441d76e1004a22390c6a369dd64083838c501c3918e4dfac8e0781129ed0e4b0862f0c655a65f1898b1710bfa063a86293b781c0cfa472ad5307376e969b492f7d99c0838baf483796339124f2a25ec50c161d626620fec401734a21f574dcbe4186d913a004f46176fa3efc50b628d8b62749671357f65285e406ea27747c4907e9378d7eda1bff296188ad446fbb98b9acdcc1cb7a336236e05035225ae3fa32daeeaf1fbfd61289cd171b2c12de08ccab80abb23a62788f24eaee5be948fbcec95d1fece612439ef6991df22b3ac4aa0705a586e54d85d7a85a6b6af520a8fc71ff4f935fb7046446ff5be8994d072bf3f8e70158b30b897a7440ecabf8e53d9d73091ef311e87a6ee6b74a146f2972566c705b357f8cc4456fa5c7440d83e71b16b96eaca72b6ffc82586968e7c4ed00091d78667a3cc29867ddfa02d06dfd7ee668590ef2ba52923bff7d31e731edd3a75467cf809efcc0164f034d2897122c7d2103249e11996702aac8798d38786cbea0febb0da4091aa032989237814aece7edc8f720b8bcc0899ae1cb9f87985e61d75483316ce35b3d90ab71a81d67637b5d774a1cfec781d7ce14f289c24c90fbafc277539b68afe6af15739ecab51f0e5bab2a83d344adb621ce45b3c53a7b2d5d926206ad8acf0a364f28d5291a204082b4e7043ef02ab6997f3588cc2807ccebaa6b70937c6720c66bb942f0adfce53fc4278d1aa365898ae5528b5e6fa82d5e2cbd837acb0dacefe131aa963ddcac236da43f01f9fe499cbaead2c645270f8d54871d740146532e70646bc11cbf3813b7665b1cf0460600000037d68381907c022e37c84f0be30e01fdbe26e1888594e8137ad7602f2fce1fee556db4890d7d6b265daa7bd005d8eb4bfd198994a5d684dd679cab8b2d3e037d43bdb156514153ba80accfcc7f2afe892d333e1a1f307bc63084731ac9d42cf5a125b728e7060cbf82b23158a6c97072b896d869f362cfc13b550eb2d1db24f231e0508f33af60a08cfacd82aa07d7f61d69ec83e240b588b48b9190ba31aacb72dd1351aebe5cd0e72ea079d7fb093bce417805c99765decda773cd9c42214eb374cb9cab05fe9b3a16e8ba81b69dc35b5709ef53e0998f012271642a9e1b1bf6549d43823309ba2917a95469b492db92cf384477a2ed0c8b81ba00a13bc7be6b96b514a73a6c6b72e4976587425179b57473f78bae701317b23636c22d237127307c4ef9e0ca67a03e1cd0d5f7132c713c88cb427c2a1351cda6fe286f41d210ea1992b11e3dff1a293413682741d3eb403c97beab504574d33e0bccfd5ce5bb1a06e66e8600fb652d448a69cc22558cb3513449ea2aaad11b1a33036e43feaa3002970af11ddd654570aee46a6e5b737bcc387dfba6815848ba571d8bd2777eb6c84d5a37c4e6f598e6cf2166a352e9da408eaf250979ceaeb07747ebed93fd1ad274b48c0fb9793557597cb1b5c0196994d9f85730826e7ec49edb4ffb508895d2374de5439f3c8bf27b9b79c7f0451075dec5371b0ef91a4160ede9ea1ba8bbd60430210d5d9f08e8dbc70cf50aaf19929b536c62f986154920ef6c95ddd7251da155b76ce326a35fcd08650d297266850968993d666d8fe1e6f3b6649758970447875313fa2c99d3ad942caa52a66984981b0a708bb9e9f879a96ec2cc14c1da880ec4de2219cefb1b0c9da38c7a57997bd3c55c735989ba77c2413c5fb2b51088554deb200ceeba401833c4a86d8ecf847911d09dede7e7b11924d21e7ad0b5272d28153a811b1500aabcd0e77ed6fef56a69b2b0a44d5b4578a0022895bbe58b2c00075641b85ea529d684c5d6844d4b0f87e72835a0a3e7a06af9c78959f7bc7d3c006ea5b34618b97519b578026ef82bce1cacad464539cd5862249d2208023c9a93195bf624b85c21c0a09c96ffda0513d5851de85ba97e7ab63ea152089c0f6ed0cad68c30f034e1157082ee476e16ff47ea8141bf5521a6a8905d7b21af2112eda71aff6b74b52bfbdb3a45a390c94254b536f4573f434a41518d12d5f67db36ff7cd0b63aeee1d664d7b84d4f13a45fba14f3c3f224c89ec9c6d44be39baf096316a6db52bb44b0c7edcdcc86255fc4b138f4ec0ca2a32c676c6ab8ee9aeae2439c42fbad2f255bc91caca162afb6b33e138de01d11bb1a33f6e7fd16322aff31c7cc6a2e7f8c9d54c12c066b7a746340ac484b609d62c6d8fb6f362b2907f36cc92a4fc17636da276c32fda4f0538931dfa782ac4ce82c373ec3ce96390129e3d1250982e130ee7124aa69bd7b1ec12da05498a21d32e95752cab4f79105c6d5237d3a975121354ae95d1d5761ad40cab19d1ddb88607186256c68e84f9087ae2634831046697846dc8788a1aca6272db90051a132f8c302bfd47a34399b11d1bc12bfe0658d6e695bdef0b5b0cc6d35f6462e83ad30bbfbb05e87862d4f9282144af0948875ab35e03f34e27d3f75603c14c53a9e118e36516e0244fb568f678ad63fb55f7d5846ce04b43aaf41e39de22bda86441b421d152a45325efd98e4daf33f90e6fbe3e1e9608fba5297f224da6373e6529352987012348bb04926740f97ec5ce3d9bd4da1d8678dcc4601c23b47a55153b358b1d47785707781a7215391078d5819f6a4149eb3254cd43c2428a6e9511cf16367ccd2f32c7d7b843539363efb3f858f46bfa79f75e01f785a3f2daba49df0bdadd078c8d52b31b42b25f60ea962e9fbc9165c5beb95315b42728a982ff5cc9bb2190d07bc6b45e7bced2b5bd7734f02cccc1fd22a9576e373b041dd47d800f1487e7c58b1ac9dc91aaec94531d1ce97c41aa4c568e611be4a96303052bee30eb10da24a36f39c19e71032cc009d4dcf41daab970ed920a1d2c6d04a23f9f3926117eb541c15d641606ea866b9781a7019d5626958d6aea7ade89ef5645975b5bab625442b595bfb18dba5c62f2b035b30564c9859eb850a6f68fb949f00003129a86ac70268ae89ae1536e4d486bf8c655e85ea35273abfcabf33be1938624ded8c11b4e5403c0603f082d568edba562493d34e7d90e0bc308d8496cc5df65e7ab5f5c2c87dd37c41847eef21eb782829d0de2dc938b47393d2a8a24b919f113a9cd4f294fcbf153c778c1d7950e44db05c82ca72cb3c63980185cd791a6c965597811763205c4c16e0ead93e790d4bdaa58bd3ca6efd688aa7cc94dd924344bd20739d15097dbfe47f295086bc3729db388643f6dd2ac9d2f761e40f0960508f1644efd0a9fb025df586c0bfb1685cee4008a104e8730c47a69d2c13fa341630685ce896a87920bbf8d9337dea04bba5f9fb17c16acebc373da0d05440b939bc9e689193b07aec9535a8b0e41c5856ff2e5c9566444c3c7bd9efcd38efc8cc918f93b83922c01f8acdfed4a5152c44274e1bcc177d3260d067647937fc3042c646c86f0eb6b754cbc879d18a961b43f0531d738f0e8fa5b78929d042d5342a0c91664e954aefd5c734da25fa55883325d94ffa3f6938d33de350ed2a7ab44c1a935faf47ee5f61acce40710cfe99a3560d26f70772a8b68b349c9f772f36bb2c536e610f0c13188e70a66607b78e1c5b198c6f224664c0227f0749465347e942e83042af4cb4e7a70e5349574e0c2d1caef87f75479d6eb"], @ANYRESDEC]) 09:02:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000040)=[0xb0e, 0x7]) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]) 09:02:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplies=0']) 09:02:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="666d61736b3d30303030303030303030303030303030303030303030302c64697361626c655f7370617273653d6e6f2c636173655f73656e73697469766520e3d57b64959f28fc0447f0c72352b42c9d43121406058cef929781f6f4a8d348df360516a025b5ceb971dbd7563bef"]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$VIDIOC_QUERYMENU(0xffffffffffffffff, 0xc02c5625, &(0x7f0000000180)={0x19c5, 0x0, @value=0x6574}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000080)=""/29) creat(&(0x7f0000000040)='./file0\x00', 0x10) 09:02:14 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000400)={0x39}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r2, 0x2285, &(0x7f00000014c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x1, 0x200000, &(0x7f0000001340)=[{&(0x7f0000000100)=""/150, 0x96}]}, &(0x7f0000001380)='\x00\x00\x00\x00\x00\x00', 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getpeername$llc(r3, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x10) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000002c0)={{}, 'syz0\x00'}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) 09:02:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=%']) 09:02:14 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="666d61736b3d3030303030303030303030303030303030303030fe143030302c646973616236d88475e78173986b551e274faa6c655f7370617273653d6e6f2c636173655f73656e736974697665894a90219f106f5e83d727adccead42b4bcbe9caa7047facc88fbfbea83857315ca504d9c9ff4a6f2ad51d1f1b6af8995bac38587aef75277849be7082d7397de275822a1361e0e1b90f21ecc2f6164627c8bcaea867f82344f1f7dd5cc83daa72105bdf5a43cbca1b5909ad73e27bef9e2c370286ef9a92d780467c7ccd3cf005293252ff746b77e188f0c973a2bae5a626294c6ce481c70b2082a5"]) [ 842.850587][T14057] input: syz0 as /devices/virtual/input/input5 09:02:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) 09:02:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 845.107098][T14091] __ntfs_error: 35 callbacks suppressed [ 845.107106][T14091] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 845.168454][T14091] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 09:02:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:16 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000040)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) 09:02:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=\\']) 09:02:16 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'ipvlan1\x00', 0x1}, 0x18) [ 845.400965][T14112] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier option argument: \ [ 845.449299][T14115] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 845.468017][T14115] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000000 [ 845.475567][T14117] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 845.502709][T14121] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier option argument: \ [ 845.516649][T14132] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 845.527402][T14132] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000000 09:02:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x60}, 0x1, 0x0, 0x0, 0x200080d4}, 0x100) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) 09:02:17 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESOCT=0x0, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000040)=ANY=[@ANYPTR=&(0x7f00000001c0)=ANY=[], @ANYRES16=r1, @ANYRES16=r4, @ANYRESOCT=r1, @ANYPTR, @ANYRES16=r1]]]) [ 845.616686][T14117] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 09:02:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x420, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SETFMT(r1, 0xc0045005, &(0x7f0000000040)=0x2c) 09:02:17 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', r4}) r5 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB="2c6d66745f7a6f69706c6965723d3078303030303030343030303030303030312ce66d61736b3d3030303030303030300c00000000000000"]) 09:02:17 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="666d61736b3d304a3030303030303010303030303030303030303030302c66697361626c655f7370617273653d6e6f2c636173651f00656e736974697665"]) 09:02:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) timer_settime(r4, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) timer_settime(r4, 0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f0000000100)) ioctl$DRM_IOCTL_MODE_RMFB(r3, 0xc00464af, &(0x7f0000000040)=0x4) 09:02:19 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f00000001c0)=0x3) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_GET_API_VERSION(r5, 0xae00, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="400000001400011800000000000000000a000000", @ANYRES32=r6, @ANYBLOB="00000000002aca6dc63792f40b018000007400"/29], 0x40}}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'veth1_to_bond\x00', r6}) 09:02:19 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmmsg(r0, &(0x7f00000008c0)=[{{&(0x7f0000000300)=@l2tp6={0xa, 0x0, 0x10001, @rand_addr="dc1b87266dc560fc385565b39abb8fd1", 0x2000, 0x1}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000380)="aff6cd5fa201d05eb71c4994519fca9763443b05eb7b05c9045689870911ffd4744bb63baaf7aad65472e70f7e4883c40ce6dd4bf1499c16ee3b250f988fb437a5ea71f1bd76dee98113833887e87b758cf117a1e3c2df2e01ac0b62ce4a9c800c1c2033160dd9e91b5d6449eb1ec86413606d862c91b7aa3eb754eb6251", 0x7e}, {&(0x7f0000000400)="3de8e2c9ec183e18f3f6c7a03fcbde087be3311d81b36e6c84c5549adc5e852ba29541d8be090acd88bbbd1e06c7ef1cd0e21dca3469b83770e318c119d56ee2ea4d9c3a924776a62c3e0f96caec3bae8d29b8c714e6be1bbf49c8aa61552e3d8df110ec5559f18c3fec98f290de7ec8724d4a4c7b5bca211e4a7f328bcfb9", 0x7f}], 0x2, &(0x7f0000000480)=[{0xa0, 0x11, 0x7f, "404bb72ab0700699e6c9cf0379c505e4e17cd551dd5c1b4beec20fbef8f7d45b9eee2c2c273c51c0cfcbe663d02d6d9ad2f4bb56c64bcea2a0155ee88e5f583ae1c1656b05096dc99a7626ff528d9ae13fb4b19684759f62faa138de1e17412f9993c1cffaa80f7dc76391dc34d9d9258d06df95fe56e7c9fe3507d45e4909ff0157d760c2de415e78"}, {0x18, 0x104, 0x3, 'E'}, {0x40, 0x2b5, 0x9, "de715e9fbd2d8d0a599269c3ec44a8708c340c573d34e3bab20f7edec9de9a08078f1a342dd7a9c3ca0332"}], 0xf8}}, {{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000580)="36c29aade640a932308be92ecd28a0cfd76b9f305e94f682528210eb2a1c7b6760428ed4d817137e636f9bc55679e940bac1ca64567a06086a91a30e0fce526bf6222fde24388d3630903ed5135b810bb38d296091b673698775355d36dd933962f1c44f565f910ab8354abe39d6ead78fc50e07dacb81b7bfba51f157314583efb781ff7b6966502ac0e72f1616a4e54afc79f252e6d13a4ba15a7d5c9e3273e32a8648f2fdb8395a166deefd40a4ecc9c91d38bd2adf8b20d800e0ef93e0979fa328478bab", 0xc6}, {&(0x7f0000000140)="34a270fb1ba15a0c36034c6be60017fac98fc32f32058c4bf8", 0x19}, {&(0x7f0000000680)="d8cbc1ad7ecc144b4f27ad7516d5435673fcada8d71e1d94bca384ebc037b6e04516488f58cd1c70faaa135b779a58b7f00d31eeeda9eff5bd4470b2f435d39a17cc67656b4329c198fe65b4fc7c211b4fbd40bd730666b2912777697388df4a1496c652323c04633e0cdf5c070e843815c4cd23c9", 0x75}, {&(0x7f0000000700)="9224f358fdd9a5bc5cd891b307a8c02cf0a8cc65967e97e3c998bfdb1df325477922a1013f3614a1c09551bb397f56d539ae1ad5cd139c4b692b760e22b7bc8bb505d0127139cbb222b2b79d1bcec8172f93edcaaa7654ea93121722e976c529de010a58cfd28a0257a1068b72659ac22e47912e2318c8a9854c659b384ce49f95ae622906de13c9334a91f42fa268e9bc39e5214a4e71fb730dd2960cc7d5134da7fe0e38f517a2cf109c25a14a3c713b44a4", 0xb3}], 0x4, &(0x7f0000000800)=[{0xc0, 0x0, 0x4, "ade6ad009b09983d72868dd5945378e2219cb6ce52b16260a4705ed0295888d1312533710c3ab105d501cdbe9b3de400ba99b7919ea05f880ede99f99244b183d40443a1f7b5f5c5e148f4590df750f75462fb5ff72e383ab2de2a13c4f2d2dda757080ff46a57aff647fc2f77e34a9e30badc62cca48c8fa7c800e25e478f2527a4a53d04ab38d4d99f5c064cf8cb180dc0b85e3bd2ca81268c392dd27804a5ab68f5df8efacdb47b9ecb4c6da8af9c"}], 0xc0}}], 0x2, 0x8040) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="440000001300200029bd7000fddbdf2507000000", @ANYRES32=r1, @ANYBLOB="445002000040000008002900baa5000005002700080000001400140063616966300000000000000000000000c0751e256b353e897f83fe2a3d6dd9c902c5847da88f33e368cd1bb4315b8b3750177623cfb3e5b9834b5bb5b6e0fcb55924b55e9fc2b71b768c5c5dc9fcc3082c7a7ab632bd954b40bf4094e409cbcca95f651985460964e44fd9889576db947cda0bd9ec53e6e0896148dc2a8403de2d96b173e68c14315dab507f934acc587a266e0f97ae1bcfeb03c6ddc4023841e8e5fa7dbcca88eb2533633b9919327edb707217b21c8ee9897e593aa407"], 0x44}, 0x1, 0x0, 0x0, 0x2080}, 0x0) syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x0, 0x0, 0xe6c02, &(0x7f0000000200)=ANY=[@ANYPTR64]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x2) 09:02:20 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x832, 0x111401) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x4, 0x100000000) sendmsg$AUDIT_SET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, 0x3e9, 0x200, 0x70bd29, 0x25dfdbfc, {0x1, 0x0, 0x1, r1, 0x4, 0x2, 0x2b000}, ["", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x400c800}, 0x4) socket$netlink(0x10, 0x3, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x100, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) r3 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYRESHEX, @ANYBLOB="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"]) 09:02:20 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket(0x11, 0x800000003, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000001c0), 0x10) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000040)={'gre0\x00', {0x2, 0x4e20, @loopback}}) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r2, &(0x7f00000002c0)={&(0x7f00000028c0), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, 0x1406, 0x200, 0x70bd29, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0xfffffffffffffe74, 0x1, 0x2}]}, 0x20}}, 0x8815) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0xfffffffffffffffc, 0x4) r3 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000002900)={0xffffffffffffffff, 0xffffffffffffffff, 0x7, 0x4}, 0x14) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r4, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r6) syz_mount_image$hfs(&(0x7f0000000300)='hfs\x00', &(0x7f0000000340)='./file0\x00', 0x20, 0x8, &(0x7f00000026c0)=[{&(0x7f0000000380)="184057d5c8ceeeaa4f206a471bb192ea9c561d40cd639b2206f46248b5ab99333b0ea974e2446b7be759d19f70ffb022d5f8b1b86667d5bad3fe230e30b14a8c76156ad5052c2cb9c11ed865a61dd590c60c4b83ae5183ce36e220f186d4b8bd2383", 0x62, 0x3ff}, {&(0x7f0000000400)="e352fc98205f93528698769a91056bc0fb8df747c412027eca7aae5f6c4f76df6ef239ddb4f326ca687dc7c320b71fdda6a6b5a763450b687ad13af53d487ae7c50374860150cd151d1b", 0x4a, 0x5}, {&(0x7f0000000480)="6333631b78bc4702598e4342a92705456487e41f838fbb5c8b0cb299baea3b187c92245404378f7bba4233ed2ad85c1cccf196952d47a09366d9ea849c1f9790c6fc95eef7c600cbaee183d1f0d21708b03051f91af8722c753fd00ef87ac60820e617d03d653e67770fc8ed9ebe386cae83d6ffd2472827f5c13e2e9b4a68950a09b63ce3c353e35e81ad", 0x8b, 0x3}, {&(0x7f0000000540)="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", 0x1000, 0xffffffffffffff00}, {&(0x7f0000001540)="a1e8772feeb4f042793f124c169b05116796410b", 0x14, 0x9}, {&(0x7f0000001580)="05659db3a32498d753b92df84d66a8eed07cc9377d25bd16c85da161a9e56e1f3207e7906c9ad655ecb019328acf4ed5b10852a82b9c2f10a6569ee0613b8d9a566a872756a5d953c613269124051ced69207d5ba666de76ee92943e75d680acddb2f1eebce90e1387c7585b59653724e142dacd45b92ea886045d2001e395d08e45c668d6428cb2cf829e5867b74891fd694c9bd2a3c05fa665329d3522fb9c3015b8b9bb162a5808f2dd036727fd18be5860f8805df0ae494dd1", 0xbb, 0xfffffffffffffff9}, {&(0x7f0000001640)="045417435f84adcba6ca28a3518879e3403b2b09d8c22b17b23580b866ed0a866753ccf3b15387a24a137b638881adb4d973792df5d2708785a7995133d56c2d3274d5992482c9db53b0f02930ddfd61bda519db30", 0x55}, {&(0x7f00000016c0)="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", 0x1000, 0x7f}], 0x3020, &(0x7f0000002780)={[{@creator={'creator', 0x3d, "6f8a215c"}}, {@codepage={'codepage', 0x3d, 'koi8-ru'}}, {@part={'part', 0x3d, 0x5}}, {@gid={'gid', 0x3d, r4}}, {@iocharset={'iocharset', 0x3d, 'maccenteuro'}}, {@quiet='quiet'}, {@dir_umask={'dir_umask', 0x3d, 0x8}}, {@iocharset={'iocharset', 0x3d, 'maciceland'}}], [{@dont_appraise='dont_appraise'}, {@smackfsfloor={'smackfsfloor', 0x3d, '{'}}, {@fowner_eq={'fowner', 0x3d, r6}}, {@obj_role={'obj_role'}}, {@fsuuid={'fsuuid', 0x3d, {[0x65, 0x35, 0x39, 0x39, 0x39, 0x36, 0x35, 0x32], 0x2d, [0x62, 0x35, 0x7, 0x64], 0x2d, [0x64, 0x64, 0x30, 0x61], 0x2d, [0x62, 0x35, 0x34, 0x63], 0x2d, [0x34, 0x35, 0x66, 0x35, 0x38, 0x38, 0x33, 0x65]}}}]}) 09:02:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRES16=r2, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) 09:02:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRES64=r0]) 09:02:20 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) connect$bt_sco(r1, &(0x7f0000000040)={0x1f, @none}, 0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB="2c6d66745f7a6f6e655f6d756c7469706c6965723d3078303030303030303030303030303030312c666d61736ba5a830303030303030300c"]) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x107481, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r2, 0x8933, &(0x7f00000001c0)={'wg1\x00', r4}) 09:02:20 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r3, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r5, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl$sock_inet_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000240)={'erspan0\x00', {0x2, 0x4e23, @local}}) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x1}, [{0x2, 0x4, r1}], {}, [{0x8, 0x1, r3}, {0x8, 0x1, r5}, {0x8, 0x1, r6}], {0x10, 0x1}, {0x20, 0x1}}, 0x44, 0x2) 09:02:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000G00\f']) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f0000000040)=""/50, &(0x7f0000000080)=0x32) 09:02:22 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 851.209750][T14298] __ntfs_error: 28 callbacks suppressed [ 851.209759][T14298] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 851.242533][T14298] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000G00 [ 851.374744][T14310] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 851.384989][T14310] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000G00 09:02:23 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:23 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000100)=""/222, &(0x7f0000000040)=0xde) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSTI(r3, 0x5412, 0x101) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xd4, &(0x7f00000002c0)=ANY=[]) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r6}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r8}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000009c0)={&(0x7f00000003c0)={0x5d4, 0x0, 0x0, 0x70bd26, 0x25dfdbfb, {}, [{{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r1}}}]}}, {{0x8}, {0x138, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r1}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x10001}}, {0x8}}}]}}, {{0x8}, {0x278, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x2c5}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x61}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0xb118}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r1}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x3f}}, {0x8, 0x6, r6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r1}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r1}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}, {{0x8, 0x1, r8}, {0xf8, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0xfffffffe}}, {0x8, 0x6, r1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xfe6}}}]}}]}, 0x5d4}, 0x1, 0x0, 0x0, 0xc090}, 0x0) 09:02:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)=0x8000, 0x4) 09:02:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xf) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000000040)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) [ 851.523611][T14321] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 851.539054][T14321] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000000 [ 851.541258][T14322] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 851.597912][T14329] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 851.614505][T14329] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 851.624216][T14334] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. 09:02:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x3f5, 0x100, 0x70bd2b, 0x25dfdbfd, "", ["", "", ""]}, 0x10}}, 0x10) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) 09:02:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="666d7107cf6831d2db13ff61736b3d30301b1caadd30303030303030303030303030303030302c644e7361626c655f7370617273653d6e6f2c636173655f73656e7361746976653d6e6f2c6769643d9290ff136d755b5b54c6d6b8fc00", @ANYRESHEX=r1, @ANYBLOB="2c6d66745f7a6f6e655f65727a30c45f210b2611fd0000000000000000"]) 09:02:23 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x4000, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x6) 09:02:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYBLOB="2c6d66745f7a6f6e655f6d756c7469706c6965723d3078143030303030303030303030303030312c666d61736b3d3030303034303030300c4181e18844aa51316268a888d7f43744001b43ea2a95243bc3902b17be3fd32a736e11fa09e3da4e2ed8f57ddd77ab0fdf2352f322bf468948b6e53a282b61353c69462ff0fcac1211c5b33b773d90e77733ff17db36e3954143cd"]) 09:02:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_SMI(r1, 0xaeb7) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = geteuid() r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r6, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) fchownat(r3, &(0x7f0000000040)='./file0\x00', r4, r6, 0x100) getsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f00000001c0), &(0x7f0000000200)=0x4) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=ANY=[@ANYRESHEX=0x0]) semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, &(0x7f0000000000)=""/83) semctl$GETNCNT(0x0, 0x3, 0xe, &(0x7f0000000300)=""/214) mount$overlay(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100)='overlay\x00', 0x20000, &(0x7f0000000140)={[{@metacopy_off='metacopy=off'}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@xino_on='xino=on'}, {@nfs_export_off='nfs_export=off'}], [{@subj_type={'subj_type', 0x3d, '(,eth1\'selinux%ppp1trusted'}}]}) 09:02:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:25 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:02:25 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:26 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_SET_NR_MMU_PAGES(r2, 0xae44, 0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,Cmask=00\f \x00\x00\x00\x00\x00\x00']) setsockopt$TIPC_GROUP_JOIN(r2, 0x10f, 0x87, &(0x7f0000000040)={0x42, 0x2, 0x3}, 0x10) 09:02:26 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x0, 0x8100) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000080)=0x1) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(0xffffffffffffffff, 0x80044326, &(0x7f0000000680)=0x80000001) dup2(r1, r1) sendmsg$sock(r1, &(0x7f0000000640)={&(0x7f0000000280)=@vsock={0x28, 0x0, 0x2710, @hyper}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000300)="9200bfb7a86dde5ddd8a40f0c66fe3ae51839bea891ef42bfd0a44cd3700aa4cfa8908373c7f7e55af041dceaaac76862e0f0fd1c75ad2485f5abeabbfdb4bd3c9677f055fb6ac3bc0b4e705634c08ef4cc17356fbff87f50c713c335f3bca7815d24c414ee5d366e4eaf94762ba3359422405846ee31479ddfc3da51d25f8072e924ccf2a4d2ef5e7f8288bd5033acd97f54c685fd51957f74acadfea9fe2ddd0a83724458bf831cb0f30912f4b530dc1a48ff64bb544a7f6bf6a05a3d10d122e9c698503f7ffc620832c3fda5d5b1e7880da22504d2103", 0xd8}, {&(0x7f0000000400)="bf2159d375940dc67c4f6c00def7c553e7a41164e75ed01e40810737a6e243079b323a2a856dff1769d19a610f4890f9809f940724ceddf0175191cbbbd67640ce113f9625de72811485933278265c14a38a398ddb0e2242715eb890e52f201611337e5c252a2e2203945bb48f082903f07bfd049c2b9fc2e5ca3f1933532679a13ca6c2eccd9c980e7311a3fed214a5b09adc948edd3aede9c73f661fd6accd2e67328c2e7cf575a2a4", 0xaa}, {&(0x7f00000004c0)="f62c005b2bb7e110d234e832aaf2", 0xe}, {&(0x7f0000000500)="95b917a75566155e147f5b684546e1ee22bb2e8b662fa3bf0301190d9a4b76d8d8fcdf9b910cf593c2dfbcc0d56cffb803da06eb19d68027c74bd4aaff110a29b87ee94da452232f5597fef49becc61cc01d9fe471e3afa7d0fa4bd5cff11c9b128f0d3b08eedf921ef421e785338d2c61eb0cb081d15a89ba3ac1fbb58eabac2e5c8e208f7a5787801fdc992c786fe0a338627b048a49", 0x97}], 0x4, &(0x7f0000000600)=[@mark={{0x14, 0x1, 0x24, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x800}}], 0x30}, 0x4) 09:02:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_NEW_CTX(r2, 0x40086425, &(0x7f0000000140)={0x0, 0x2}) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r4, @ANYBLOB="2c6d66745f7a6f6e655f6dcad01b80ccb9849ab4f1"]) 09:02:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockname$netrom(r2, &(0x7f0000000100)={{0x3, @rose}, [@null, @null, @remote, @bcast, @remote, @netrom, @default]}, &(0x7f0000000180)=0x48) accept4$llc(r2, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000080)=0x10, 0x80000) 09:02:26 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$USBDEVFS_RESET(r1, 0x5514) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="000061736b3d303030300830303030303030303030323030303030302534646935e9000000000000617273653d6e6f2c636173655f73656e736974697665b3ee2633fc4084b57a4671b0bc6afaa66feec6eb76328279f79692edc47e4fee52f5701ec2411b66136c7fd8b0105ff65e1d6107733a0aace304fe95543b3a1b4ab941202937e35acd0904b16a6aeb7fe4966af1a8"]) 09:02:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_STAT_DEL(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x20, 0x1412, 0x400, 0x70bd2b, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8}, @RDMA_NLDEV_ATTR_STAT_COUNTER_ID={0x8, 0x4f, 0x5}]}, 0x20}, 0x1, 0x0, 0x0, 0x8}, 0x4) 09:02:26 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r4, &(0x7f00000002c0), 0x40000000000009f, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r6}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r7, r7) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r9}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) r10 = socket(0x11, 0x800000003, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYPTR64=&(0x7f0000000340)=ANY=[@ANYRES16=r4, @ANYPTR64=&(0x7f00000004c0)=ANY=[@ANYRESHEX=r8, @ANYRESDEC, @ANYRESHEX=r6, @ANYPTR, @ANYRES32=r7], @ANYRES32, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYRES32=r2, @ANYRES16=0x0, @ANYBLOB="0fd98e50b79662d0d1ebf85d7cdb9f912d7c64d34818d4a0002c363a313a42d72843e0a152145e6f0c9b490775279757d1aa4e48655a95bb8f0d89d07a77c45d0eafad97e71e516358669bc447a5ecef9623d7babc0e94d06666b693508ca406cf8b96652d6ee92f3bb0d11eba9afa4d54c8ff51a8c2c7c209297223d4e4f4bd358b2c4d22", @ANYRES64=r9], @ANYRESOCT=r1, @ANYRES32=r2, @ANYBLOB="5a2e6e386a31072238976c468ecc082eacdcc20875bae0046522b0e2d2680861cfd6c2b348c3f37190c8ceea8311ec160571e4bb42e03a0ada4a68c656a7831834c6834748c0233d117dba3cca4ea54aa2b12714dae5da136b4e4b9120970d3f085e749c3a91b997845c146052ab10917df02c436b967100ab222502dbe4a5daf30f332af4e87fa6b7c642820309a48647c7973d559abe77ce29ee320890af7f303993bad0e6152397a0190fc627aa7dd3ec08057d476f90a6dda8ceb609f1f99e333030a206abcb3535c3fd78787c1766dccaa565a2da0ad4fecd5fbefce1722b680d7df99d850326252271d8558af924", @ANYBLOB="2a0bb15771f8018ff19908fd5d67daeac69ef92f593f802d51f34e6266e6fd537f69231818d12f0c826d69ba463c61a1219186bea85a762e6f1ec99138aa", @ANYRES64=r3, @ANYRES16=r10]]) 09:02:26 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/partitions\x00', 0x0, 0x0) getpeername$netlink(r2, &(0x7f0000000200), &(0x7f0000000240)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file1\x00', 0xcd, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="663d303030303030305130303030d9303030303030303030302c64697365626c655f737061722c636173658173656e7369747731d95e6dffff7fff643d0000000000", @ANYRES64, @ANYBLOB=',mft_zone_multiplier=0']) 09:02:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:28 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept$unix(r1, 0x0, &(0x7f0000000040)) 09:02:28 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000080), &(0x7f0000000100)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40086432, &(0x7f0000000040)=0x9) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) [ 857.292516][T14499] __ntfs_error: 41 callbacks suppressed [ 857.292607][T14499] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 857.349123][T14507] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 857.361791][T14507] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000000 [ 857.501728][T14499] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 09:02:29 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_PIE_OFF(r1, 0x7006) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PPPIOCGIDLE(r7, 0x8010743f, &(0x7f00000002c0)) sendmsg$TIPC_CMD_DISABLE_BEARER(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1b000189", @ANYRES16=r5, @ANYBLOB="00040000000000000000010000000000000002410000001000137564703a73797a3100000000"], 0x2c}, 0x1, 0x0, 0x0, 0x40801}, 0x0) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x80, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r8, 0x29, 0x2a, &(0x7f0000000440)={0x4, {{0xa, 0x4e22, 0x4, @mcast1, 0x5}}}, 0x88) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x2c, r5, 0x20, 0x70bd27, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0xa004}, 0x4000000) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="666d61736b3d3030303030303030303076523045d959ca1c30303030302c64697361626c655f7370617273653d6e6f2c636173655f67232747861d2cd66fc1656e7369746976653d6e6f2c6769643dae16cb331bcc9c386cf79b5fe809d1167c331af6f56f22464b70efd718bc60eeb1de36165688261dd0270b1a112951f1688f5030491af7c3b68bf2012aded32847fb06fb009d3c15191917206c4a93078089f96f106f18c7160c0d0bd4cc2c23e14636000000", @ANYRESHEX=r2, @ANYBLOB=',mft_zone_multiplier=0']) ioctl$sock_x25_SIOCADDRT(r8, 0x890b, &(0x7f0000000500)={@null=' \x00', 0xa, 'veth1\x00'}) 09:02:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:29 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040)=0x5, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESOCT=r3, @ANYBLOB=',mft_zone_multiplier=0x0000000E00000001,fmask=000000000\f']) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e22, 0x1, @ipv4={[], [], @multicast1}}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) 09:02:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x7, 0x0, 0x0, 0x0) 09:02:29 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r9, &(0x7f00000002c0), 0x40000000000009f, 0x0) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = dup2(r10, r10) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x80, &(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYRESOCT=r1, @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYPTR64=&(0x7f0000000200)=ANY=[@ANYRESDEC=r4], @ANYRES16=r2, @ANYRESHEX, @ANYRES16=r4, @ANYPTR64, @ANYRES64=r8, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYBLOB="2c16ba5c175380f56f51a1b24aaa181f22ac3534c900c656934236018fb1280ca849dfec835149c45f00c2bd4e4caeb2b567ba583cae01ba723ee498fc15eb1c28009b925eca108d4bc1a12492a380cbea0a6be8446a6458c4e0283e058e8409d48bc191cc2c5c27697a922d8510826bbb40668590dbe07b015a026ad5d0d4f8e30af79f8cfa81c3f95c2015ca8c82e9b6c8cb5361efc149f7d324b9cc3b561185de0cda2a2142", @ANYRES64=r4, @ANYRES64=r11, @ANYRES32=r11, @ANYRES32=r5], @ANYRES32=r9, @ANYBLOB="8b98148daae9cacaf3a0fb922ac5e8b4dae9910737a59f29eb361882568a214af661e9cbcfdbee5fa0835843da0128b3f7f7ceaf377ef40f6f88e177704e06e70b1867a234b292cc86b8b68a29a9ed8c7dfe47c260b2d42b200707d8"]]]) [ 857.685180][T14529] ntfs: (device loop4): parse_options(): Invalid fmask option argument: 0000000000vR0EÙYÊ00000 09:02:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x7, 0x0, 0x0, 0x0) [ 857.774433][T14533] ntfs: (device loop3): parse_options(): Unrecognized mount option 00000000000000000000005. [ 857.788681][T14533] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000000 [ 857.805669][T14544] ntfs: (device loop1): parse_options(): Unrecognized mount option @. [ 857.821687][T14549] ntfs: (device loop4): parse_options(): Invalid fmask option argument: 0000000000vR0EÙYÊ00000 09:02:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x7, 0x0, 0x0, 0x0) 09:02:29 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000000080)=0x80000001) 09:02:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 857.991416][T14556] ntfs: (device loop3): parse_options(): Unrecognized mount option 00000000000000000000005. 09:02:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000040)={0xb, 0xfffffffb, {0x54, 0x8001, 0x3dcf, {0x1, 0x7}, {0xff1f, 0x8}, @ramp={0x3839, 0x7ff, {0x2, 0x3, 0x3, 0x2}}}, {0x54, 0x7ff, 0x6, {0x7, 0x1000}, {0x0, 0x4}, @const={0x8, {0x1000, 0xffff, 0x4, 0x6}}}}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) 09:02:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="666d61736b3d30303030303030303030303030303030303030303030302c64060061626c655f7370617273653dcb9c1877838cb1202c636173655f73656e736974697665"]) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000200)=0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x4, [@var={0x5, 0x0, 0x0, 0xe, 0x1, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x9b8}}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0x2}}]}, {0x0, [0x61, 0x0]}}, &(0x7f00000002c0)=""/4096, 0x5c, 0x1000, 0x1}, 0x20) timer_create(0x1, &(0x7f0000000040)={0x0, 0x2e, 0x1, @tid=r1}, &(0x7f0000000080)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) timer_delete(r0) 09:02:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB="000000a2f0826a010000000000000046001de4b0797eb5b23cb8bdaf83517b0b57a2cd2d8d69a6f3d1a82a29a0"]) 09:02:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e22}, 0x6e) 09:02:32 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:32 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000040)=0x7) 09:02:32 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000100)={0xab6b, {{0x2, 0x4e21, @multicast2}}, 0x1, 0x2, [{{0x2, 0x4e23, @remote}}, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x190) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) 09:02:32 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 860.981754][T14639] ptrace attach of "/root/syz-executor.2"[14638] was attempted by "/root/syz-executor.2"[14639] 09:02:32 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:32 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000200)={@loopback, 0xffffff11, 0x2, 0xff, 0x8, 0x7, 0x1}, 0x20) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)={0x2c, r4, 0x401, 0x3, 0x0, {{}, {}, {0x10, 0x13, @l2={'eth', 0x3a, 'team0\x00'}}}}, 0x2c}}, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r1, 0x8982, &(0x7f0000000280)={0x8, 'ip6erspan0\x00', {'veth0_to_hsr\x00'}, 0x1}) sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r4, 0x800, 0x70bd2c, 0x25dfdbfe, {{}, {}, {0x8, 0x2, 0x8001}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x2400c801}, 0x800) r5 = creat(&(0x7f0000000180)='./file0/../file0\x00', 0x0) read$smackfs_logging(r5, &(0x7f00000001c0), 0x14) r6 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r6, &(0x7f00000002c0), 0x40000000000009f, 0x0) sendmsg$IPSET_CMD_SAVE(r6, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x34, 0x8, 0x6, 0x3, 0x0, 0x0, {0x1, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x20044005}, 0x40000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r7, @ANYBLOB="2c6d66745f7a6f6e655f6c0165723d30"]) [ 861.070223][T14648] ptrace attach of "/root/syz-executor.2"[14647] was attempted by "/root/syz-executor.2"[14648] [ 861.166334][T14664] ptrace attach of "/root/syz-executor.2"[14663] was attempted by "/root/syz-executor.2"[14664] 09:02:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:35 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSBRK(r1, 0x5409, 0xfff) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) 09:02:35 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000k=000000000\f\x00'/56]) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) r2 = dup(r1) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000200), &(0x7f0000000240)=0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) waitid$P_PIDFD(0x3, r2, 0x0, 0x1, &(0x7f0000000100)) 09:02:35 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00') sendmsg$ETHTOOL_MSG_LINKINFO_SET(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)={0x18, r3, 0xffff, 0x0, 0x0, {0x7}, [@ETHTOOL_A_LINKINFO_HEADER={0x4, 0x1, 0x0, 0x0}]}, 0x18}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x34, r3, 0x200, 0x70bd2c, 0x25dfdbfd, {}, [@ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x3}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x4}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x7}, @ETHTOOL_A_LINKINFO_PORT={0x5, 0x2, 0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x240080a4}, 0x40000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r4, @ANYBLOB=',mft_zone_multiplier=0']) [ 863.743825][T14701] __ntfs_error: 20 callbacks suppressed [ 863.743832][T14701] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 09:02:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 863.805857][T14703] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 863.808628][T14700] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 863.835808][T14713] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 863.844761][T14700] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 863.879669][T14703] ntfs: (device loop3): parse_options(): Invalid mft_zone_multiplier option argument: 0x0000000k=000000000 09:02:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:35 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="666d61736b3d303030303030303030303030303030303030303030b0302c64697361626c655f7370617273653d6e6f2c636173655f73656e736974697665"]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000001300)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000001340)=0x6, &(0x7f0000001380)=0x1) r2 = dup2(r0, r0) recvfrom$inet6(r0, &(0x7f0000000240)=""/32, 0x20, 0x10043, &(0x7f0000000280)={0xa, 0x4e20, 0x9, @loopback, 0xffffffff}, 0x1c) syz_mount_image$ceph(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000180)=[{&(0x7f0000000100)="36db59032cbbe02e85f104b3be438d7b86f077d286a6be8efea09c515cd44744d52cfb1c518c14f72b656526d3128771b6c7dd", 0x33}, {&(0x7f0000000140)="6aa6fa8e71a095bc9ce7e4fe40ff7242ca812e01814b9ff55bc47d14ceb322", 0x1f, 0x1eb4}, {&(0x7f0000000300)="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", 0x1000, 0xfffffffffffffffc}], 0x5000, &(0x7f0000000200)=',\x00') r3 = syz_open_dev$tty1(0xc, 0x4, 0x3) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) r6 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r5, 0x84, 0x1, &(0x7f0000000080)={r7}, 0x14) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000013c0)={r7, 0x9}, &(0x7f0000001400)=0x8) setuid(0x0) ioctl$SIOCAX25GETUID(r2, 0x89e0, &(0x7f0000001500)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}}) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r4, 0x84, 0x6d, &(0x7f0000001440)=ANY=[@ANYRES32=r1, @ANYBLOB="56000000bd28a654df82bd8d5bdf9505dc034544314b0fc169458d393275e09101437ed4c3ca967f565563aa4eb0b68914f2a157e28fd975d40b9ac642dc4caad5cc03e9b88d5235fd321ce21ef338f8bc9012e4e0a11d1f7975"], &(0x7f00000014c0)=0x2) syz_open_pts(r3, 0x200000) 09:02:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 864.054452][T14724] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 864.065581][T14724] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 864.077511][T14736] ntfs: (device loop1): parse_options(): Invalid fmask option argument: 000000000000000000000°0 09:02:35 executing program 4: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000240)=0x6, &(0x7f0000000280)=0x4) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r2, @ANYBLOB=',mft_zone_multiplier=0']) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x86000, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2c, r4, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x18, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x4, 0x4}]}]}, 0x2c}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1100021}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0xac, r4, 0x100, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xddd}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4c55}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x80}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x50000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffc1}]}, @TIPC_NLA_MEDIA={0x24, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0xac}, 0x1, 0x0, 0x0, 0x100}, 0x10) [ 864.131295][T14720] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. 09:02:35 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 864.386903][T14762] tipc: Invalid UDP bearer configuration [ 864.386924][T14762] tipc: Enabling of bearer rejected, failed to enable media 09:02:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r5}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r7}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r2, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1bc, 0x0, 0x8, 0x70bd25, 0x25dfdbfb, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bridge\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKINFO_HEADER={0x88, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @ETHTOOL_A_LINKINFO_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}]}, @ETHTOOL_A_LINKINFO_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}]}]}, 0x1bc}, 0x1, 0x0, 0x0, 0x8000}, 0x4000080) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r8 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r8, &(0x7f00000002c0), 0x40000000000009f, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRES64=r8]) 09:02:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:38 executing program 1: r0 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@nl, &(0x7f00000001c0)=0x80, 0x800) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getpeername$packet(r1, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000600)=0x14) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) sendmmsg$inet6(r0, &(0x7f0000002d80)=[{{&(0x7f0000000200)={0xa, 0x4e20, 0x2e, @dev={0xfe, 0x80, [], 0x10}, 0x9}, 0x1c, &(0x7f0000000540)=[{&(0x7f0000000240)="a8782c896a211f0105bae8173d26acd66806a77fb10d4b61c050a9b6730931be9cec92", 0x23}, {&(0x7f0000000300)="4433d07c2218fb443b367203553968f9b3918ff60d71a57d16631b385ee1fbc47ac8166ab097901b38a16aea39154a8030b82144d83d7c472dd8c2aa6774259758eb3108a5066fe6d7635a3b", 0x4c}, {&(0x7f0000000380)="1d6c7689163ca862bd9ae8e0538ce90a474669e73d945585b9a50f915285b60da3cf817667c3502e495b6c65222950c013974013a7877e5ec4382b1e0858bc9556bc257ef5e531a59628f0e6c442f6ca63b37a9a9642f1f6b3f697d4032860173aa1c2b9846b9f3334f7330cebcc164df801e2bc23c0d4dfe27155fc7de911b93ce62e9ca46da37c870652e6af91fdb8ff0ee76743696b2c837f30422b35", 0x9e}, {&(0x7f0000000280)="efc0c1ad30e1528303a73b0b090d5df6f02cbb12cd9df925d8c66c", 0x1b}, {&(0x7f0000000440)="a16bed671dd30c471c82bd09596157521889d999f9e7b2749f32d3f6c9b831e021903e1ac0a3b736595e2fd394b5a79978c86f858e66e6efa76fca8e13d0c76d0158844cd98d3f7ddbe6977c1b4cc0bbb572be0c55cc32ec82a77b649d6aa9da3b5a836064b11ed4aade0898ea643a76ff9a21054133d36a810b235fb9d36373d39b72fa0a221d0b98aa5a91b7ea731d9aee54e10160e056cabf77eb5c191ab38d76cdd257285abb89e1956ab357c8e209e7dfd1695fa9bca7c8ac319a5bd5f4a5d34e3c8ff3b2844f160b4efea7774bde9fafb880b5d3ff5a436885c287f68dfdf4", 0xe2}], 0x5, &(0x7f0000000640)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast1, r2}}}], 0x28}}, {{&(0x7f0000000680)={0xa, 0x4e20, 0x0, @local, 0x8}, 0x1c, &(0x7f0000000800)=[{&(0x7f00000006c0)="84668daf8e8f9d975fa6258deb9474f7fb4b6d030e8cd3236b3c249bfd9995dbe7ab96d2a69678eb74c9e94319d7941de22a22715f0604bdc271e62078e26ff60da963a425a2de028fd56618ffea678498dbd5e46f9e3d101c76d264ea7a96dd9abd57a5c6985e6be84ffd2c349fcdaa356e9dd5fbfba4660ceb0d3a1bbb480a5d0242230d5f0cec8657712adbec7ab74c8d496589f34d3ab852685d23d2fad417ebef3a6c6569776f9037cd2343de502a1ee0dbfe67c0fded7a5e32c1f879406e1e7e109ec2a60295c2cb8de1f3a2c9c0e040ff1169990465850335c3db201f3b6a6c728d90c82e980b10fb23", 0xed}, {&(0x7f00000007c0)="da9e122ddb23f0af40d742aade42a95584bfa216bb915c", 0x17}], 0x2}}, {{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000840)="e88997a9dc97c4d502e8ee29aff914ae79b1bafcdc60993c7c9198a7b1389c48c4ac13db5ddaf2acae2ffac8bd9b35e6c89c72ea37e5b4a6999a8373", 0x3c}, {&(0x7f0000000880)="79c1bd752ad819", 0x7}, {&(0x7f00000008c0)="6c0eadb31ab936bb", 0x8}, {&(0x7f0000000900)="170acd09a39aa45eed5dae9547494e52f5bb554aae5c0f1bbf772a892234c939810c5f9907240615c670d740ebffc2c85fa4ae678aa032e82b037e1fdfba85d9afef9adfbefc3e8aecf2fc0698319269f5c153f12daa2d3a7a8e2aab1f129886caefc6fdc61a32b32d4ccc8113506d39f468289ceb9b2b18cb48297f5fce0cf6cc53fa8046e302880a3f311b87b8718dcdbaa0ab1828a1572899d7c9dbf8f5d66e9d", 0xa2}, {&(0x7f00000009c0)="4001dffa750c1a90e0fabb046331f941edc123fab93b8b32bd83d767e07e1eadc1d104636a35cfef6f1762e44d0e9fe98c9dc9e8b22581e116b553116bc37fa6bb3ecc556eeebb840f4d071a962b26d15db98bf3f2205367452302d967a9d8706713343a9eaf2d2eb6e58ba62597a02c0ed7c9faebf644702ff5e4249b52ce352225f85ed94fbea6055fecabe0136456", 0x90}], 0x5, &(0x7f0000000b00)=[@rthdrdstopts={{0xc8, 0x29, 0x37, {0x3b, 0x15, [], [@hao={0xc9, 0x10, @loopback}, @calipso={0x7, 0x58, {0x0, 0x14, 0x7f, 0x400, [0x4, 0x0, 0x0, 0x8, 0x101, 0x1, 0x3, 0x1f, 0xfffffffffffffff9, 0x5]}}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x101}, @calipso={0x7, 0x10, {0x3, 0x2, 0x40, 0x1, [0x101]}}, @padn={0x1, 0x2, [0x0, 0x0]}, @jumbo={0xc2, 0x4, 0xb21}, @hao={0xc9, 0x10, @mcast1}, @enc_lim]}}}, @flowinfo={{0x14, 0x29, 0xb, 0xfffffffb}}, @rthdrdstopts={{0x38, 0x29, 0x37, {0x73, 0x3, [], [@pad1, @padn, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @loopback}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xfffffff8}}, @dstopts_2292={{0x180, 0x29, 0x4, {0x2e, 0x2d, [], [@pad1, @enc_lim={0x4, 0x1, 0x65}, @generic={0x7, 0xe6, "93817733b1971108ceef1ed6278800094f4b5f1c2f08dcfeeeff9a9e3cabc15e91c22d4f4d29dfe8b2c1eb40621331c5b688019634bbf0840b53bf174800fd30ebe29493bf175a18f096d25f87acfeda3ca6993cb81503ac238140a75e4ff978c629b3ba61aa7fc11bad658b2731729439606f9e6cb4dd3385e4a66407080e6d30baa390374f2d1f8e0242bb5ff2906be8ccb1c489f3134e3ab2540b6953d4bc5b1ea0c1c6145ebd850b46f6350444f989225de234ab5c820898211b2b4db44fc3336750f7fcc8b18ce1c5786aca0cf931e7acde3d82d6c938f4e1f33f127328ef7bd5d95b0b"}, @jumbo={0xc2, 0x4, 0x8}, @pad1, @pad1, @generic={0x2, 0x6c, "42cd0d60b8a73e751cf7ff6fd9c0479dd552e98e922465b2b61ff430c58ef7834d41780bc4d3534fd06876c22c49049aa862c660d656e018bcea6c9263f42d621f3d98f74b970efae04ba0cf8e9e3a261815d2a5d81cbe8296eebc3cfc4050824f4426a8200a2cfe865809b7"}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback, r4}}}, @hoplimit={{0x14, 0x29, 0x34, 0x7f}}, @dontfrag={{0x14, 0x29, 0x3e, 0x52}}, @hopopts_2292={{0x28, 0x29, 0x36, {0x2b, 0x1, [], [@jumbo={0xc2, 0x4, 0x80000000}, @ra={0x5, 0x2, 0x2}]}}}, @hopopts={{0x240, 0x29, 0x36, {0x62, 0x44, [], [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @generic={0x1, 0x12, "ddc08f18ab688307b4d9c4d4a61ef88f0b57"}, @generic={0x2, 0xe2, "93490f107946100fc4389dd2dd6a7263460bc981dd501dcd4581dbd12d586578e49f2692ad63a7cb39ccdda34692688a3c17218cf16372e2adb4408173d256b9b96b23cd08960bcc46558773bd123113e829db1fad1d8d2d52e8e674439aea60fd2ecbf8f9a138b099b0a5552b6b78720f4d8e69c834f41fd249f7a10b7387406bc19162f899b8784e8a4404bfce31d947f984346a70e55735e5e8f73ebcc61c73f82bee642dca55e9ceb0b9849672a8aed26e3e21a97e8194d1e240466d9a13fa2de488054681fe8e51a2201a8e161911cbd7e624153683528e56a366555622581d"}, @ra={0x5, 0x2, 0x41d}, @generic={0x8, 0xef, "0d972141fe056c891f60b1fcb37c07e4d0a4fd8ec9b10614efe7ff5eb8cfa1bb0cacbac07209309b1cf6e930c6ba8ceecf6dcc281f90350faa8116eff584a2836c3abf2a10ff30906a0ecd65b2b3f9d8675f940a68bc0c97d7966f31104e1ab1a21c34bb6c6a513841757280cdad75218d4f5e2655b8e0538882f55c00abb033214ab469aa3e4ae362d158d918f3aa6530b9689bb88af527a68ea785a4b81fdc0193fe122ae778574d41be8fe63f928842b6b2d836d0ee53894d2f84fb68fa3eca6edd542c2af31d8e9bcea2d65098bb6054b175b7bab56600545062998b4a0b1bdca5909a3aa1d549612bffa3b560"}, @jumbo={0xc2, 0x4, 0x3}, @pad1, @calipso={0x7, 0x28, {0x2, 0x8, 0x3f, 0x167, [0x6, 0x4000000000, 0x88, 0x8]}}]}}}], 0x570}}, {{&(0x7f0000001080)={0xa, 0x4e22, 0x8, @mcast1, 0x8}, 0x1c, &(0x7f0000002140)=[{&(0x7f00000010c0)="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", 0x1000}, {&(0x7f00000020c0)="ceaf1ba696eab6ffce10dda1dc1866cc3f", 0x11}, {&(0x7f0000002100)="d62621d1f8f631ef18447406d7593bd8a5af5a38d6299616d3727825fe82912543", 0x21}], 0x3, &(0x7f0000002180)=[@dstopts_2292={{0xb0, 0x29, 0x4, {0x0, 0x12, [], [@calipso={0x7, 0x30, {0x1, 0xa, 0x4, 0x3, [0x401, 0x23c, 0x9a0, 0x0, 0x79e]}}, @ra={0x5, 0x2, 0x8000}, @pad1, @pad1, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @generic={0x6, 0x27, "6d7f7057242c2acb31ac5514af88a937fba31c44a5a712811fd24211b4b387beb4be38df493639"}, @pad1, @jumbo={0xc2, 0x4, 0x5}, @hao={0xc9, 0x10, @empty}, @hao={0xc9, 0x10, @local}]}}}, @dstopts_2292={{0x38, 0x29, 0x4, {0x11, 0x4, [], [@padn={0x1, 0x1, [0x0]}, @enc_lim={0x4, 0x1, 0x3}, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x3, [0x9, 0x10000]}}]}}}, @hopopts_2292={{0x48, 0x29, 0x36, {0x2b, 0x5, [], [@calipso={0x7, 0x20, {0x3, 0x6, 0x0, 0x101, [0x8000, 0x1, 0x6]}}, @pad1, @jumbo={0xc2, 0x4, 0x5}, @enc_lim={0x4, 0x1, 0x8}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x8001}}], 0x148}}, {{&(0x7f0000002300)={0xa, 0x4e22, 0x8, @remote, 0x5}, 0x1c, &(0x7f0000002640)=[{&(0x7f0000002340)="29963e38c3418dfbebe6bbae8b138b93a8c703af9c0833ffc465a130474fc3d2b07113f14bbf93f45799c0ab474963997092c41d33ae4eaeae4c9284e4546bce747d633850440c2f6c4589a453897669132a69be945f8b4fa110843740012d159df35a4c98140916d4abb0fec611b455d2b89688630cc3d167036655caffb43513eb153e98e1d1d057beb431aa0d140124bb44930482af5694ba47091196ffc5b22dc71040731c9d6a3c0e06c2d37b4da6dd909c7c0cdac0e8682657c07504c47bb82f1b091c7f3db08070d3fca55345d0f99e3073e131d074cec459db0d154eb09e3a27b26eac82cd", 0xe9}, {&(0x7f0000002440)="94740aa6d8cd5e8e69000f632c23351008ecff026c016424b65bf743612e388ef4263ff85b727c05657cf4a5a96aecd382373574d1e26be4d771f2d34b290a9c7a05d92fe1c1dac3f5ebd161a472405796fd4932aa4e33a136997a8d9a5e6e68aa052664c5a56d7b7dc54be488a71d2f53aec14c93aa413c310c858ad13335c7438eeb12fb2566e2c51db9e32d7309e61866a83fcca834d0a2fa9f47e30f53107bba12988f0b063a1d67e1d26e284db77f29ef91f9ff933ab6d225253b3bd040839bad5f176a9cdb0d68e09c0ec1603a318d0527a3ba8c1846b3087edd2d0dcd694295d6078c6ce2", 0xe8}, {&(0x7f0000002540)="3d7590caa60db61245f6a3ca95a9e78f4d873fef7d7f2aeba6d996be0d08a0ca920b8df026c2ffe8e177065cea3403b849e4cfe118364ccfa0af131f98a0eaa88885561e58b47e902e6bb75adf189f936b57223d4c5e8313a72e25355b93a0939648267e921b48918994596ef88ce092eef7a9f004ea7c142be5d6e8dcfc6f64b0ca483f9d0362ef50fa03de30bd0ac037ca4356a942de416914965add45650c4af072637d1707619c830f16b2a25811117dee1e50307b0019d191c6677ef0a94d9376943765e7898615f344577f2a96", 0xd0}], 0x3}}, {{&(0x7f0000002680)={0xa, 0x4e20, 0x1, @local, 0x8}, 0x1c, &(0x7f00000029c0)=[{&(0x7f00000026c0)="71b735f0177fb448bebf274be5e3d7df3943ef25098570814383d8cd1d77a8c21cca05c4749828fb2ac175b422b836013b36ce17593d2408cf4900147ef09ed3a1a6ff80253d35ce1994b2fa3d4d8ebf07a3d8", 0x53}, {&(0x7f0000002740)="a1b10a26a28d3a114b58de2e29b41f285908f52a1bfe07c460270ae8cec1497008391c7c185a74d2c346694de7c93f2260ea8b0f120626ee6a56f3e8d7f99b44be112db9f9f0ea7e812c49fb9e37f4b2c5df03d734c4425a4ac2760843adb1b06aa1b617d8e07752124c7f7b314f37395873fa0fde83f037435d5ed20b9d73bab583bd45b44e79adaa670532fc01f97d43ac02de3e3d8b4b4e2c836fc11cca0e1ff535271f4e024227aefd9ff0341fcdf4fa6b87b79f2dc2ac70b9547d52aafbac2751a4", 0xc4}, {&(0x7f0000002840)="25af80140ae5eac5516980d554fe92dfb507b4c857e86ca547065049e1419ea4b3b1369475eda13d7e7860d80fcc9bc1de0709707cb46761c14cf62f54c53f0065f0494b20e98cff8da1cfbfd890e4221018d8c5c0d1f1855d9ee9d29b38d1104dbb04f19f92b55196f8472899fc43451aab5a0476568794d12eeedab2d112ef086670b2dd1ddbb2e5288df345ef45c08a2d944ce29b89e07c371cfd5b8cb25470c6021d5621e3411c078cdf03755bf41f813882db0ed1e3ce827ef28c2b261579cc9dcb565eec2f61b25e74c1303163a593814fe22f6b65a9478cec9fe1a12ddb45520bb42cccdd01d8624bde6afe906b56be08", 0xf4}, {&(0x7f0000002940)="416abd665de99fbe01ca46bb866bf6d564bb789b46a2d5538d0df640467c88d69312e5df140db9e51b66cbfaf820d61203f25ffe1de9223732a76f14f4bc0f30c304b439d4e9517c4c0c3179c0a56ccce7160a0ab656", 0x56}], 0x4, &(0x7f0000002a00)=[@dstopts_2292={{0x20, 0x29, 0x4, {0x6c, 0x1, [], [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x2}]}}}, @rthdrdstopts={{0xb8, 0x29, 0x37, {0xa4acc8cacfd1bd7d, 0x13, [], [@ra={0x5, 0x2, 0x6}, @pad1, @generic={0x8, 0x47, "4ff63bc0b7ecf3769ec79129ad7a33e4ee4c0103f77bc5c9a047828cac0e5f7dc76d138bd42c9f539733b496d22a570be30bc37597bbb139852d46185a9476b598d0ebeb176a53"}, @pad1, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @calipso={0x7, 0x30, {0x3, 0xa, 0x4e, 0xeb99, [0x2, 0x10000, 0xffff, 0x700, 0x5]}}, @pad1, @pad1]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x800}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x6c5}}, @rthdrdstopts={{0xc0, 0x29, 0x37, {0x33, 0x14, [], [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x1, [0x0]}, @calipso={0x7, 0x38, {0x2, 0xc, 0x4, 0x1, [0x5, 0x1, 0xfae5, 0xfffffffffffffffe, 0x6, 0x0]}}, @pad1, @enc_lim={0x4, 0x1, 0xf7}, @pad1, @enc_lim={0x4, 0x1, 0x1}, @calipso={0x7, 0x50, {0x3, 0x12, 0x7f, 0x1, [0xffff, 0x8, 0x200, 0x7, 0x8c2, 0x40, 0x7, 0x4, 0xdaa7]}}, @ra={0x5, 0x2, 0x8000}]}}}, @hopopts={{0x30, 0x29, 0x36, {0x33, 0x2, [], [@jumbo={0xc2, 0x4, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x7f}]}}}, @dstopts_2292={{0x50, 0x29, 0x4, {0x29, 0x6, [], [@ra={0x5, 0x2, 0x80}, @pad1, @pad1, @padn, @calipso={0x7, 0x20, {0x3, 0x6, 0x6, 0x2, [0x8001, 0x2, 0x9]}}, @ra={0x5, 0x2, 0x2}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x9}}, @dstopts_2292={{0x110, 0x29, 0x4, {0x3b, 0x1e, [], [@pad1, @calipso={0x7, 0x28, {0x2, 0x8, 0x8, 0x0, [0x5fbb15c4, 0x200, 0xd600, 0x9]}}, @generic={0x1, 0xc2, "e1f3fbec7f38cc4279b3f7102c53f395b9c5dea3ade42b9c63aa87a0f4782176bc9e0296861aa2f9843274903bc990d0185e48973b329abb1e5c0960498a4986b40355c4135dd1402f84fd84e271a1c7149fd5bd49b81e2a5b03f2f23746ec2f5e77bc649d3a1ded8f1b8bcc23199b7d4f71a07c5825f81fa5aa6028da117b89b3ad043682526f471c76263bf3ef85b87a544dd5ef2943ca2575eeb2f1d7bf0ea5867451dbf0ca7218cea018d974b13128f44a276a94dfa01322a86b806e88f22513"}]}}}], 0x370}}], 0x6, 0x8800) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="666d61736b3d30303030303030303030303030303030307b3729dca8aafa62cde673d152182f3030303030302c64697361626c655f7370617273653d6e6f"]) 09:02:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB="2c6d6f097df2b7939051e4231248438d198f5b6d756c7469706ce99c272006"]) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000240)='trusted.overlay.redirect\x00', &(0x7f0000000280)='./file1\x00', 0x8, 0x2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl$sock_rose_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xe23, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x0, [@null, @bcast, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @default]}) 09:02:38 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:38 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="666d61736b3d30303030303030303030040030303030303030303030302c64697361626c655f7370617273653d6a0000006173655f73656e7369746976653d6e6f2c6769643d", @ANYRESDEC=0x0, @ANYBLOB=',mft_zone_multiplier=0']) chmod(&(0x7f0000000100)='./file0\x00', 0x0) 09:02:38 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) 09:02:38 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @l2={0x1f, 0xfa, @fixed={[], 0x12}, 0x0, 0xb9811457aced8978}, @hci={0x1f, 0x2, 0x4}, @l2={0x1f, 0xce33, @any, 0x8, 0x1}, 0x5, 0x0, 0x0, 0x0, 0x485, &(0x7f0000000040)='dummy0\x00', 0x7fffffff, 0x0, 0x7}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) 09:02:38 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESOCT=r2, @ANYRESHEX=r1, @ANYBLOB="2c6d66745f7a6f6e655f6d756c7469706c6965723d30ddcca499a49900433d59ce6d881484f4a1ee1cba204c0b5a1f22550d8fd6900c2b7cb9b66bfeb6c963900502e1c638bb376edb9966156c5402298ea0bc5a7b428380c747a01c65f5865762fb899fd5b59a94dda2e64e37e5af58da390de221aae7ef8f9be0066417e1ca374998d6e77cc89858c11f0e6de0313dffc5e9f9859377f5bb7a93500c184fe762d97de140d20a543e694f805f475ac86245d5e9bdd7bf5f295732328122365a4e72ff0426e68fa934294cbf8aa8fd3ca52eecbfe7e6115b0ed2b07f2a"]) 09:02:39 executing program 3: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ocfs2_control\x00', 0x8040, 0x0) accept4$rose(r0, &(0x7f0000000300)=@short={0xb, @dev, @rose, 0x1, @netrom}, &(0x7f0000000340)=0x1c, 0x80000) r1 = socket$netlink(0x10, 0x3, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r6 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r6, &(0x7f00000002c0), 0x40000000000009f, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1014, &(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="3865030eb2f9e04ba32951e5fbb6ff17f89f39e4ce489059a280e20c66fd7c655d8b35ae9251d95a465bd9b58016063d19a10ebf9bb38fccada77f7ad6fe13579425f0f58740e2fec53bf399f67140febf6e66403e1619f18cae839b5b48d6004d725be29a8f5d81c8219fd1950e55a9ff99f686563bcd2490accbd5a97957803029c9177fd5dee5d968b88e6bf4e2f22ca720fa904f737af5e34b437fed9369b614921d17e2ba6fdacf65871a595e8e176c28cac12ebff31e6c0613", @ANYPTR64, @ANYRES64=r7, @ANYRESHEX=r9, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="15a0abf3318f99d2105ddd8c21cb1953300b89c2d4cbc984c68e65accda7024bc78d06ff55f9e6a4a45463daf6e17fbd056a0c5c33871a950d3a51b4abf819b8dd0ff1b4da1153dd0cd6a0bee1780b57b0a012a87a3f1f95c26be2a2a481e38585520fff6f1f00c4bb55add19f", @ANYRES32, @ANYPTR, @ANYBLOB="e70e7de5935706abc7be6d"]], @ANYRES32=r5, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRESDEC, @ANYBLOB="0eee6df0e216fa3bee55bdb172ca2b", @ANYRES16, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES16=r4, @ANYRES32], @ANYPTR64, @ANYRESOCT=r6, @ANYRES16, @ANYRES64=0x0, @ANYRESHEX=r7]]) 09:02:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:41 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x40000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r4, 0x110, 0x5, &(0x7f0000001a00)=[0x4, 0x3], 0x2) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x804000, &(0x7f0000000300)=ANY=[@ANYRESOCT=r2, @ANYRESHEX=0x0, @ANYBLOB="f8b7e0b5782ef321080fe3b1b857a43a9d784a0769b03692865368d426737ed462fcc539fd89ff6b77aa711112add85dcba48facd583e9cb2fb2086d6465b40cf44092f729dadec8ae7ec604eca360d2541669b61df7b7992726c0f5e57a1bdc4e4cde6374b1f091af4a278abe084d08a53a1f2e0fb8187a6a1599d4089f6e9e47da948d36ac43ce2ab20b3c86b277b2b298340240198d472e128de79c6cd19ef2b7dcd8a9f990cc54e823104d0814cf6d05fe34067e3f3e231d8ea8a315ccf57e4ee8d52866be37c2f4c8ac40", @ANYRESHEX, @ANYRESHEX=r1, @ANYRES32=0x0, @ANYRESHEX=r3]) 09:02:41 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) arch_prctl$ARCH_GET_CPUID(0x1011) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB="2c6d66745f7a6f6e655f6d756c7469706c69337d358718c5350102d299012686552825723d30"]) 09:02:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_PCM_IOCTL_RESUME(r3, 0x4147, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x2c, r1, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x18, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x4, 0x4}]}]}, 0x2c}}, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x30, r1, 0x1, 0x70bd28, 0x25dfdbfb, {}, [@TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x80000001}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x4}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) 09:02:41 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:41 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 869.903851][T14884] __ntfs_error: 21 callbacks suppressed [ 869.903863][T14884] ntfs: (device loop1): parse_options(): Unrecognized mount option 000000000000000000000040x0000000000000000ø·àµx.ó!㱸W¤:xJi°6’†ShÔ&s~ÔbüÅ9ý‰ÿkwªq­Ø]ˤ¬ÕƒéË/²mde´ ô@’÷)ÚÞÈ®~Æì£`ÒTi¶÷·™'&ÀõåzÜNLÞct±ð‘¯J'Š¾M¥:.¸zj™ÔŸnžGÚ”6¬CÎ*² <†²w²²˜4@G.çœlÑžò·ÜØ©ùÌTè#MÏmþ4~?. [ 869.921146][T14883] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_zone_multipli3}5‡Å5Ò™&†U(%r. [ 869.971318][T14890] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 869.988615][T14890] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000000 [ 870.051493][T14908] tipc: Invalid UDP bearer configuration [ 870.051513][T14908] tipc: Enabling of bearer rejected, failed to enable media [ 870.072841][T14890] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 870.082978][T14905] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_zone_multipli3}5‡Å5Ò™&†U(%r. [ 870.083286][T14904] ntfs: (device loop1): parse_options(): Unrecognized mount option 000000000000000000000040x0000000000000000ø·àµx.ó!㱸W¤:xJi°6’†ShÔ&s~ÔbüÅ9ý‰ÿkwªq­Ø]ˤ¬ÕƒéË/²mde´ ô@’÷)ÚÞÈ®~Æì£`ÒTi¶÷·™'&ÀõåzÜNLÞct±ð‘¯J'Š¾M¥:.¸zj™ÔŸnžGÚ”6¬CÎ*² <†²w²²˜4@G.çœlÑžò·ÜØ©ùÌTè#MÏmþ4~?. 09:02:41 executing program 4: setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L-', 0x1}, 0x16, 0x1) socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={r3}, 0x14) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000400)={r3, 0x2}, 0x8) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESOCT=0x0, @ANYBLOB="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"]) [ 870.249457][T14908] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 870.277689][T14920] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 870.293118][T14921] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 870.298048][T14908] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000000 09:02:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendto(r4, &(0x7f0000000240)="d7d13ccb5f057cb353ae79fd3452a2b746d08c3480d41e0e6aaa8e0764a6ef07ba80e1d6ce116455ec047c98b614139fa7bcd1baee97688996f60aaead27e56e67ebdf566f7ce46ba24aac2966597bf00e84114c68c239ab37fd9140ef6624f902a0ad4b811f87c444c9a49b4512a3b08d9e6a59a61141d76bfa1d8d4209fd97b3f8434c6cf0b028165e5a215dcefc313bb61700bc650329f5a1e2dc6e1d19346729ce1a9e447cc2ed469ae596e42fa0eb9494d4472109cb62ce21ef61114cb0ba0351b12438ade84663d5", 0xcb, 0x48884, &(0x7f0000000340)=@nl=@unspec, 0x80) ioctl$VT_RESIZE(r3, 0x5609, &(0x7f0000000200)={0x1, 0x7, 0x55}) r5 = socket(0x11, 0x800000003, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TIOCSETD(r7, 0x5423, &(0x7f0000000140)=0xa) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="4000000014000100000000000121e139a112dbe1901c5bccb2c641bc30d945ef0809a55e72c852f5bea4de9cf6ebc363e85b38bd0fdc9c97b83d9b53b234d47d68668dc414b11286539b8710b70cf73a25dc9d978e847d253882cffde3e1938e49cc77ffeb8c09d2ddc527e74154c8ef43a87cb0da03163f4f301dc1cb91e415419d407b39cf9f8a6c477e34cbbc9d38afa330ec8decfdf7c327749d7e70509b306b2c03785f8e4391f80d75d72f03fa2005154544b08b7380f6335e4253dece1dd7056c42087dea9cac9b103c513124906422c7af224d3750a68ae3ce7af47388c5cf", @ANYRES32=r8, @ANYBLOB="140001000000000000000000000000000000000014000600018000007400"/40], 0x40}}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f00000004c0)={0x0, 'veth0_macvtap\x00', {0x1}, 0x7fff}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3fd, 0xffffffc0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYRES64=r1, @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYPTR, @ANYRES16=r8, @ANYPTR64]]) 09:02:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r1, 0x0, 0x48b, &(0x7f0000000040)={0x2, 'macvlan1\x00', 0x2}, 0x18) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r3 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$PNPIPE_ENCAP(r2, 0x113, 0x1, &(0x7f00000001c0), 0x4) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000400)={0x0, 0xfd88, &(0x7f0000000300)={&(0x7f00000003c0)={0x2c, r4, 0x401, 0x0, 0x0, {{}, {}, {0x8, 0x13, @l2={'eth', 0x3a, 'veth1_to_hsr\x00'}}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r4, 0x422, 0x70bd2c, 0x25dfdbff, {}, ["", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000080) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r5, @ANYBLOB=',mft_zone_multiplier=0']) [ 870.978802][T14936] IPVS: sync thread started: state = BACKUP, mcast_ifn = macvlan1, syncid = 2, id = 0 [ 870.998594][T14935] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 09:02:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x808, &(0x7f00000002c0)=ANY=[@ANYBLOB="666d61736b3d30d3a8f87e303030303030303030303030303030303030303030302c64697361626c655f7370617273653d6e6f2c63618b8b2767656e7369746976653d6e6f2c", @ANYRESHEX=r1, @ANYBLOB=',mftltipli\x00'/22]) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r3, r3}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r5, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) keyctl$chown(0x4, r3, r2, r5) 09:02:43 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) syz_mount_image$ntfs(&(0x7f00000001c0)='ntfs\x00', &(0x7f0000000200)='./file0\x00', 0x40000003ff, 0x0, 0x0, 0x920001, &(0x7f00000002c0)=ANY=[]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PPPIOCSMAXCID(r5, 0x40047451, &(0x7f0000000280)) r6 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000040)={0x6, 0x8, 0x3, 0x7fffffff, 0x16, "c4226a7a05ebf881fcef7fe288dccd97f9aa36"}) r7 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000240)='/dev/nvme-fabrics\x00', 0x200, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r7, 0x0, 0x485, 0x0, 0x0) 09:02:43 executing program 3: socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000080)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB="0f6d66745f7a6f6e655f6d756c7469706c6965723d30783030303030302030303030303030303154250dbf736b3d3030303030303030300c"]) 09:02:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x1d, 0x4) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x400, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) 09:02:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:02:44 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:44 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r2, 0x10e, 0x2, &(0x7f0000000100)=0x1c, 0x4) 09:02:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f0000000100)={0x1c, r3, 0x709, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x11a}]}, 0x1c}}, 0x0) r4 = gettid() r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, r5, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@NL80211_ATTR_DFS_REGION={0x5}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_REG_RULES={0x34, 0x22, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_END={0x8}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x8001}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x6}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x4}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x2000000}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x8}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000004}, 0x1) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x33) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r3, 0x800, 0x70bd25, 0x25dfdbff, {}, [@NL80211_ATTR_PID={0x8, 0x52, r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x2000010}, 0x40) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r7, @ANYBLOB=',mft_zone_multiplier=0']) [ 873.305833][T15026] netlink: 'syz-executor.4': attribute type 282 has an invalid length. 09:02:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x181000, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCOUTQ(r3, 0x5411, &(0x7f0000000180)) ioctl$DRM_IOCTL_MODE_SETCRTC(r1, 0xc06864a2, &(0x7f0000000100)={&(0x7f0000000080)=[0x401, 0x7, 0x1f, 0x9, 0xff, 0x7], 0x6, 0x6, 0x400, 0x7, 0x8, 0x8691, 0x4, {0x2c, 0x9, 0x3, 0x7, 0xffff, 0x1, 0x9, 0xff, 0x7, 0x0, 0x81, 0x6, 0xa6, 0x2, "f55dca87349f52e8a4391a5c816b9ab4332206b956c21ebf8b164a36ebf46594"}}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r4, @ANYBLOB=',mft_zone_multiplier=0']) 09:02:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCNRDECOBS(r1, 0x89e2) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r3, @ANYBLOB=',mft_zone_multiplier=0']) 09:02:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000040)={0x70, 0xb, 0x4, 0x8, 0x9, {}, {0x3, 0x2, 0x20, 0x3, 0x9, 0xff, "88214ca4"}, 0x6, 0x1, @fd=r3, 0x30, 0x0, r4}) ioctl$SG_SET_RESERVED_SIZE(r5, 0x2275, &(0x7f0000000100)=0x2) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$EVIOCGID(r9, 0x80084502, &(0x7f00000001c0)=""/26) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SIOCPNENABLEPIPE(r8, 0x89ed, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x2002002, &(0x7f0000000280)=ANY=[]) 09:02:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f00000002c0)={0x4, 0x7ff, 0x1000, 0x2, 0x9, 0x7}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000200), &(0x7f0000000240)=0x8) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x4, 0x8, 0x201, 0x0, 0x0, {0x5, 0x0, 0x5}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x16}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="666d61736b3d30303030303030303030303030303030303030303030302c64697361626c655f7370617273653d6e6f2c636173655f73656e7369746976653d6e6f2c676964a05815f718d028e3a75ead0844ae410ccb67e325c80c", @ANYRESHEX=r2, @ANYBLOB='ulti\x00\x00\x00\x00\x00\x00\x00\x00\x00']) 09:02:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8021, &(0x7f0000000100)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb, 0x77, 0x2, 0xf1}, 0xb) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000080)=0x9, 0x4) 09:02:47 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x40, r2, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0x40}}, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="a6a2f9ba", @ANYRES16=r2, @ANYBLOB="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"], 0x288}, 0x1, 0x0, 0x0, 0x20040001}, 0x40) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDCTL_DSP_GETFMTS(r6, 0x8004500b, &(0x7f0000000240)=0x5) 09:02:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:47 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 876.073887][T15074] __ntfs_error: 22 callbacks suppressed [ 876.073895][T15074] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 876.181389][T15074] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 09:02:47 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_LOCK(r1, 0x4008642a, &(0x7f0000000100)={r4, 0xd}) 09:02:47 executing program 4: socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='^mask=00000000000000000000000,disabne_sparse=no,ca\x00\x00_sensitive=no,gid=', @ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0']) [ 876.301311][T15086] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 876.362045][T15086] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 09:02:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000040)={{0x15b, 0x1ff}, 0x9}, 0x29) [ 876.445709][T15095] ntfs: (device loop4): parse_options(): Unrecognized mount option ^mask. [ 876.495731][T15095] ntfs: (device loop4): parse_options(): Unrecognized mount option disabne_sparse. [ 876.523107][T15095] ntfs: (device loop4): parse_options(): Unrecognized mount option ca. [ 876.546062][T15102] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 876.687488][T15102] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 09:02:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0/file0\x00', 0xfe8, 0x0, 0x0, 0x280004, &(0x7f0000000080)=ANY=[@ANYPTR64, @ANYRES32=r4, @ANYRES64=0x0, @ANYRES64]) 09:02:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disableNsparse=no,case_sEnsitive']) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) chdir(&(0x7f0000000080)='./file0\x00') r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000040)={0xa, 0x4}, 0xc) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x4) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) recvfrom(r2, &(0x7f0000000140)=""/56, 0x38, 0x40000000, 0x0, 0x0) [ 877.264875][T15131] ntfs: (device loop1): parse_options(): Unrecognized mount option disableNsparse. 09:02:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="602e3073fb03aa1bff30701c21666d6130303030303030300000000000000001303030303030302c64697361626c655ffffd3d6e6f2c636173655f73656e"]) 09:02:49 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="666d0500004030303030303030303030305330303030303030df4f827cb0fae2c6b988019e865dca15062011cb893030303064999a59ba8251bc8fcf9b41f42c64697361626c655f73700700000000"]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000200)=0xf8, 0x1) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x9dd7) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000080)={r6}, 0x14) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={r6, 0x5000, 0x401, 0x0, 0x0, 0x8001, 0x3ff, 0x2, {0x0, @in6={{0xa, 0x4e20, 0xfffff6d4, @ipv4={[], [], @loopback}, 0x1ff}}, 0x5, 0x3, 0x7b, 0x7f, 0x100000}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000080)={r9, 0x9235}, &(0x7f00000001c0)=0x8) 09:02:49 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3800000, &(0x7f0000000100)=ANY=[]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000040)={0x0, 0x4, 0xfffffffa, 0x800, 0x9, "10acca482d823d3b00087242537e47c479ffa8", 0x4, 0x35}) 09:02:50 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:50 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYBLOB="2c6d66745f7a6f6e655f6d756c7469706c6965723d3078309c3030383030abfa48e0cfd5def5440e3030303070303030312c666d61736b3d30303030303030303005f2f28edd446843bf7d06214071b911e87f73814d6aab00"/98]) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r2, 0xc0086421, &(0x7f0000000080)={r3, 0x1}) ioctl$SNDRV_PCM_IOCTL_RESUME(r2, 0x4147, 0x0) [ 881.161119][T15173] __ntfs_error: 5 callbacks suppressed [ 881.161128][T15173] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 881.176471][T15173] ntfs: (device loop3): parse_options(): Invalid mft_zone_multiplier option argument: 0x0œ00800«úHàÏÕÞõD0000p0001 09:02:52 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) [ 881.309866][T15180] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 881.352500][T15180] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000000 [ 881.412752][T15185] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 881.423007][T15185] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000000 09:02:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDCTL_DSP_SETFRAGMENT(r2, 0xc004500a, &(0x7f0000000040)=0x9) ioctl$VIDIOC_SUBDEV_S_SELECTION(r2, 0xc040563e, &(0x7f0000000080)={0x1, 0x0, 0x100, 0x1, {0x1, 0x5, 0xc0, 0x7fffffff}}) [ 881.522129][T15190] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 881.550799][T15190] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000000 [ 881.642244][T15195] ntfs: (device loop3): parse_options(): Unrecognized mount option 0xffffffffffffffff. [ 881.683739][T15195] ntfs: (device loop3): parse_options(): Invalid fmask option argument: 000000000 09:02:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffc, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) 09:02:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$6lowpan_enable(r2, &(0x7f0000000040)='1', 0x1) 09:02:53 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=\a\x00\x00\x00\x00\x00\x00\x000000000001,fmask=000000000\f']) 09:02:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x7, 0x0, 0x0, 0x0) 09:02:54 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r0, 0xc06c4124, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = pidfd_getfd(r3, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r4, 0xc0a85352, &(0x7f0000000100)={{0x40, 0x65}, 'port1\x00', 0x96, 0x50002, 0x7fff, 0x0, 0x4, 0x1, 0x8, 0x0, 0x1, 0x5}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) 09:02:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x7, 0x0, 0x0, 0x0) 09:02:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x7, 0x0, 0x0, 0x0) 09:02:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xb) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=000000000\f']) 09:02:56 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:56 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)={0x40, r2, 0xc573de0d27bdfe6f, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x2c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}]}, 0x40}}, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r4) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="a6a2f9ba", @ANYRES16=r2, @ANYBLOB="00042abd7000fbdbdf25020000009c0002801c00038008000100cc020000080002008000000008000100030000000800010001000000080002009a0800002c000380080001000080000008000200080000000800020065bf0000080001000800000008000100050000002c00038008000100090000000800020009000000080002002b00000008000200040000000800010000000000080002000100000008000200010000000400040030000280080002000600000008000100000800000c0003800800020000800000080002000400000008000200a4040000400005802c00028008000300000000000800040006000000080001001400000008000400030000000800030006000000080001007564700008000100657468006c00028008000100090000001c0003800800010000006000080001000eb4000008000100000000000400040008000100060000000400040034000380080001000800000008000200d5eb00000800010000000000080001003f000000080002000400000008000200fffeffff14000680040002000800010002000000040002001c000780080001000900000008000200ffffff7f0800020000000000780005803c00028008000400c7870000080001001e0000000800020007000000080003001582dd010800030004000000080002004700000008000200c34100002c0002800800040002000000080001000d000000080003000600000008000300ddc70000080001000c0000000c00028008000200ffffff7f5400038008000200c1040000080002000100000008000300000200000800030000f0ffff080003000600000008000300030000000800010000000000080001000200000008000100020000000800010006000000"], 0x288}, 0x1, 0x0, 0x0, 0x20040001}, 0x40) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDCTL_DSP_GETFMTS(r6, 0x8004500b, &(0x7f0000000240)=0x5) 09:02:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000080)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x58, r2, 0x700, 0x70bd28, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_SECCTX={0x32, 0x7, 'system_u:object_r:systemd_systemctl_exec_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @empty}, @NLBL_UNLABEL_A_ACPTFLG={0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x810) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r3, @ANYBLOB=',mft_zone_multiplier=0']) 09:02:56 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8021, &(0x7f0000000100)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb, 0x77, 0x2, 0xf1}, 0xb) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000080)=0x9, 0x4) 09:02:56 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8021, &(0x7f0000000100)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb, 0x77, 0x2, 0xf1}, 0xb) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000080)=0x9, 0x4) 09:02:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x6, 0xc88c0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000080)=0x4) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:02:57 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:02:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8021, &(0x7f0000000100)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb, 0x77, 0x2, 0xf1}, 0xb) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000080)=0x9, 0x4) 09:02:57 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 885.708731][T15332] ptrace attach of "/root/syz-executor.0"[15331] was attempted by "/root/syz-executor.0"[15332] 09:02:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplierZ0']) 09:02:57 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8021, &(0x7f0000000100)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb, 0x77, 0x2, 0xf1}, 0xb) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) 09:02:57 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 885.828980][T15345] ptrace attach of "/root/syz-executor.0"[15344] was attempted by "/root/syz-executor.0"[15345] 09:02:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 885.934816][T15356] ptrace attach of "/root/syz-executor.0"[15355] was attempted by "/root/syz-executor.0"[15356] 09:03:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r3, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8021, &(0x7f0000000100)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb, 0x77, 0x2, 0xf1}, 0xb) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) 09:03:00 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) r4 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6de9, 0x20040) ioctl$UI_BEGIN_FF_UPLOAD(r4, 0xc06855c8, &(0x7f0000000140)={0x0, 0x1, {0x56, 0x0, 0x101, {0x9, 0x1ff}, {0xb8, 0x7}, @rumble={0xa9a, 0x6ed7}}, {0x52, 0x8, 0xb645, {0xfff, 0x100}, {0x3f, 0x3b0}, @const={0x2, {0x80, 0x1ff, 0x0, 0x2}}}}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_GEM_OPEN(r3, 0xc010640b, &(0x7f0000000040)={0x0, 0x0, 0x85bb}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000080)={0x0, r5}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) 09:03:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 888.605356][T15391] __ntfs_error: 26 callbacks suppressed [ 888.605365][T15391] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 09:03:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 888.668372][T15391] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 09:03:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8021, &(0x7f0000000100)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb, 0x77, 0x2, 0xf1}, 0xb) socket(0x11, 0x800000003, 0x0) 09:03:00 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x5b, 0x0, 0x302812, &(0x7f0000000300)=ANY=[@ANYBLOB="666d61736b3d3030303030303014303030303030323030303030302c64697361626c655f7370617273653d6e6f2c646173655f73656e7369746976650000eaa6cc689148af424f17cd8060d51d3dff205fed68b3533ea17d81934b971ca886a2f982afca056c6230d59599162e05bf4c61ba92cd4ee93fc7c79de38ac839fbd900b5f534c377c0f5180be3421edf519c4d9b1377e8df8b1e439e5c843dda"]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r4, 0x40a85323, &(0x7f00000001c0)={{0x81, 0x47}, 'port1\x00', 0x83, 0xc1031, 0x8, 0x40, 0x9a4, 0x1, 0x8, 0x0, 0x1, 0x9}) socket$inet6_sctp(0xa, 0x5, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r7, 0x84, 0x1, &(0x7f0000000080)={r6}, 0x14) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000002c0)={r6, 0x2, 0x3, [0x7fff, 0x80, 0x5]}, 0xe) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000100)={0xffffce68, 0x3, 0x4, 0x10000, 0x9, {0x0, 0x7530}, {0x1, 0x1, 0x0, 0x59, 0x2, 0x9, "d8a0eb71"}, 0x1, 0x4, @planes=&(0x7f0000000040)={0x2055, 0x3, @userptr=0x1, 0x5}, 0x4, 0x0, r2}) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r8, 0x4008af23, &(0x7f0000000080)={0x2, 0x6}) 09:03:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 888.801393][T15408] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 888.819825][T15408] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 09:03:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$RDMA_NLDEV_CMD_SYS_GET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x1406, 0x400, 0x70bd28, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x800) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8021, &(0x7f0000000100)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb, 0x77, 0x2, 0xf1}, 0xb) [ 889.135950][T15444] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 889.147553][T15444] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 889.207082][T15454] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 889.232811][T15454] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 09:03:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) 09:03:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa64010, &(0x7f0000000300)=ANY=[@ANYPTR, @ANYPTR=&(0x7f0000001340)=ANY=[@ANYBLOB="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"], @ANYBLOB=',mft_zone_multiplier=0']) 09:03:03 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:03 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8021, &(0x7f0000000100)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 09:03:03 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:03 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="666d61736b3d30303030313030303030303030302c64697361626c655f7370617273653d6e6f2c76650000000000000000009113c9c3276271c2a08ddf3785efeb307847446d9770d02ee708031dbcf46dcbf848344d70b1943688964d60844a2cd2b49c1cf1ce792215a5ab1d0c871397f9fd755c5bf4709d836aaa8b780fada75de8f20061df52612df2ac5b9ef00f1d0f973ec504c8098e7100"/176]) 09:03:03 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8021, &(0x7f0000000100)=ANY=[]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) dup2(r2, r2) 09:03:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, &(0x7f0000000040)={0x80000001, 0x7, 0x101}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB="2c6d66745f7a6f6e655f6d756c7469706c6965723d30b340da85ddb19eb7e03f6eb9ccaa68b41199421c5c9c2bb85fab68cb8b47bc4be1d398f0f115709214febed858f2fabb749a0195e1a8b74f8956da50c0a223e102f112bd4eb3b25b8050d0fa87aa18b89399dc755c89a38c6220c0a6fe71225d9b89a202c387b0cf7e4f6a4804e6ad0d2b5eb0aca655cd4e37597942a6c1f7283ddf01c002d0a13533ef18f067115b69dc23e19b57c3e640a0a5c759a34ec623b9c37b8e4a2725bcf73a51d766389ef2c3e76033dd8ac6eb5f0ab19ae2daaa2be1083b8b61cd5b6e113ea5aff51698678aacb31a46061f574e03ecad789b157cb2e544ccda6a177739defa118d"]) [ 891.827541][T15499] ntfs: (device loop1): parse_options(): Unrecognized mount option ve. [ 891.913045][T15499] ntfs: (device loop1): parse_options(): Unrecognized mount option ve. 09:03:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, &(0x7f0000cab000)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000000000000000, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="d2031f34a02757bb04fe639ee20005dc39da22ad543e25754a8ae92c97dc34249a90c4ef9d72a5030bba6bb738814115", @ANYRES32=r1, @ANYRESHEX=r3]) 09:03:03 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,G:\'sble_sparse=no,case_sensitive']) 09:03:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8021, &(0x7f0000000100)=ANY=[]) socket$inet6_tcp(0xa, 0x1, 0x0) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) 09:03:06 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = gettid() r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r4, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ptrace$setopts(0x4200, r5, 0x6, 0x54) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getsockopt$CAN_RAW_JOIN_FILTERS(r6, 0x65, 0x6, &(0x7f0000000080), &(0x7f0000000140)=0x4) tkill(r2, 0x33) ptrace$setregs(0xf, r2, 0xfffffffffffffffe, &(0x7f0000000100)="cbbb90e383d6f9427df3d69ee0d09eee19fa08bbd7a41d336f2e6933839033cdad66a2304ff41f0c1cb6bc7eaf90f7aa3d5e3320f13e") ptrace$cont(0x7, r2, 0x0, 0x0) mq_notify(r1, &(0x7f0000000040)={0x0, 0x36, 0x0, @tid=r2}) 09:03:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB="2c6d9d175f7b020000000000004e6fa6474e200ea930c7dd32147f38875be2175c7f30d1412dcc36bd7a2dc62e4d8014aeb3b41b83886a6edcef1873bdd42d9f5355640178bd9ad8e18ff6d587fc48c80e06dc01da1c9270640dece9e435e0d601d5690e80fdc8f883e1578615fb6187b587af7657d6a48070baa56fe47e878a83b8567c7180a37f8c59b5d4bdbd889cf4f4f9eb516ba721b5efd87438d73c47a99b0ba8e09794bcc67e31d3965b66040d6954c6f611f40aca81e357aa4e7cd0e86b848dab25ccc82efe02b8b9606093886d253bbadd676ae840c2335917ef0787a8c7db3a86515ea6cd936954373a9a26fbd967abdd14561973e61e967e25daf998c73ff50000000000000000"]) 09:03:06 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 894.692215][T15558] __ntfs_error: 5 callbacks suppressed [ 894.692223][T15558] ntfs: (device loop4): parse_options(): Unrecognized mount option m_{. 09:03:06 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x3) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = pidfd_getfd(r1, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGIDLE(r2, 0x8010743f, &(0x7f0000000140)) 09:03:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8021, &(0x7f0000000100)=ANY=[]) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) 09:03:06 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0x69) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB="2c6d67745f7a6f6e655f6d756c7469706c6965723d30c11e3db1cf0bcc7da190c3f31c77358e5187de5770420377e4ffc77741e72517b0967b4cb5dbe4b289ce47c6beadb9aa33c9cbac6628f2d547f117587ddf8b86933987ed7397fc14d2698e4dfebf77573ac667510d5dfd8f1ca423552cad0619210131f08406915beb69678324b51607040c1a1fd47a3d3fbd7569a4cecaea73f8ef81269e8a1d41059a96ac88d1d2aca8c870e9"]) 09:03:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) 09:03:06 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) socket$inet6_tcp(0xa, 0x1, 0x0) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) [ 894.943763][T15583] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 894.960112][T15592] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 895.049022][T15583] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 895.138186][T15608] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 09:03:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:09 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) 09:03:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000080)) recvfrom$rose(r1, &(0x7f0000000100)=""/133, 0x85, 0x10000, &(0x7f0000000040)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6, [@default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null]}, 0x40) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="660d0300003d30303030303030302330303041303030303030303030302c64697361626c655f7370617273653d6e7f2c258785f64e37f447d30698435f730a3125cfaa821c8613e24af0187d30cbcf760b4cd1a880d7ad56c788fb9e317032c2474f209f765b24c054f3b1d9bac39009c5be7fcca93d46f524a8b49aafecd0f1c1b6a062b46085027ecd0797e33233b2560368267620dc5b07a302ecfece72c0629341affac85e050481687e585698524bb68ebf2dd5a6fd9be3dc91491c6a955c1687ae38eac8b1e27e9669e3ca2b7a8e51a8b0b933158bbbaf4f88a605"]) 09:03:09 executing program 3: socket$netlink(0x10, 0x3, 0x0) openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) [ 897.805705][T15626] ntfs: (device loop1): parse_options(): Unrecognized mount option f . 09:03:09 executing program 3: openat$smackfs_load(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/fs/smackfs/load-self\x00', 0x2, 0x0) 09:03:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r4}, 0x14) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000100)={r4, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x94e2, 0x9462}, 0x90) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) [ 897.935968][T15637] ntfs: (device loop1): parse_options(): Unrecognized mount option f . 09:03:09 executing program 3: openat$smackfs_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) 09:03:09 executing program 3: openat$smackfs_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 898.077172][T15649] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 09:03:09 executing program 3: openat$smackfs_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) [ 898.148989][T15654] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 09:03:09 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x19420, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) 09:03:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:12 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:12 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r3, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r5, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl$sock_inet_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000240)={'erspan0\x00', {0x2, 0x4e23, @local}}) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x1}, [{0x2, 0x4, r1}], {}, [{0x8, 0x1, r3}, {0x8, 0x1, r5}, {0x8, 0x1, r6}], {0x10, 0x1}, {0x20, 0x1}}, 0x44, 0x2) 09:03:12 executing program 1: futex(&(0x7f0000000340)=0x2, 0x1, 0x1, &(0x7f00000003c0), &(0x7f0000000400)=0x2, 0x1) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00') sendmsg$NL80211_CMD_GET_WIPHY(r5, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f0000000100)={0x1c, r6, 0x709, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x11a}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r3, &(0x7f00000015c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001580)={&(0x7f0000001500)={0x48, r6, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x2}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2}}]}, 0x48}, 0x1, 0x0, 0x0, 0x24000804}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, r2, 0x0, 0x5, &(0x7f0000000040)='ntfs\x00', 0xffffffffffffffff}, 0x30) sendmsg$NL80211_CMD_GET_MPATH(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x64, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x5}}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xc751, 0x2}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7ff, 0xffffffffffffffff}}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @multicast}, @NL80211_ATTR_MAC={0xa, 0x6, @multicast}]}, 0x64}, 0x1, 0x0, 0x0, 0x8004}, 0x4850) ptrace$getsig(0x4202, r7, 0x1, &(0x7f0000000100)) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) 09:03:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_ALLOC(r4, 0xc0206434, &(0x7f0000000080)={0x1, 0x0, 0x10002, 0x7}) ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f0000000200)={r5, 0x80000000000}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r6, @ANYBLOB="2c6d66745f01ef6e655f6d756c7469706c6965723d30"]) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_MD5SIG(r9, 0x6, 0xe, &(0x7f0000000100)={@in6={{0xa, 0x4e22, 0x4, @remote, 0x1e945c49}}, 0x0, 0x0, 0x32, 0x0, "df0983b732373630f9b2fae0ec3760b351633911ffcbab85094129e9dfea4d2c31b16d339b09ba7d65c8ced851adf483a505dd4a6116a64bf833ba88a44a4c1a1f1d42a1827fb7237827334daf5445c4"}, 0xd8) r10 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCINQ(r10, 0x541b, &(0x7f0000000040)) [ 900.816088][T15686] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:03:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="40000087f3cb5a7600"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='squashfs\x00', 0x200020, &(0x7f0000000140)='ntfs\x00') [ 900.878392][T15689] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_ïne_multiplier. 09:03:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:12 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r3, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r5, @ANYBLOB=',mft_zone_multiplier=0x0000000000000001,fmask=00000000000000000000000,errors=recover,show_sys_files=yes,gid=', @ANYRESHEX=0x0]) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl$sock_inet_SIOCSIFDSTADDR(r7, 0x8918, &(0x7f0000000240)={'erspan0\x00', {0x2, 0x4e23, @local}}) setxattr$system_posix_acl(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f00000001c0)={{}, {0x1, 0x1}, [{0x2, 0x4, r1}], {}, [{0x8, 0x1, r3}, {0x8, 0x1, r5}, {0x8, 0x1, r6}], {0x10, 0x1}, {0x20, 0x1}}, 0x44, 0x2) [ 900.963975][T15701] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_ïne_multiplier. [ 901.000771][T15704] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 901.081519][T15709] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 901.108341][T15704] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 09:03:12 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000100)={0x80000000, 0xc, 0x4, 0x800, 0x185, {0x0, 0x7530}, {0x5, 0x2, 0x1, 0x4, 0x80, 0x1, "146ce4fe"}, 0x7ff, 0x2, @planes=&(0x7f0000000040)={0x1000, 0xa361, @userptr=0x2, 0x10001}, 0x9d0, 0x0, r3}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r4, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:12 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:12 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@ipv6_newaddr={0x68, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @mcast2}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x78, 0x4c}}, @IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_ADDRESS={0x14, 0x1, @dev={0xfe, 0x80, [], 0x26}}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="400000001400010000000000000000000a000000", @ANYRES32=r4, @ANYBLOB="140001000020000000000000000000000000eeff140006fc008000007400"/40], 0x40}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r5, 0x84, 0x74, &(0x7f0000000200)=""/42, &(0x7f0000000240)=0x2a) r6 = socket(0x8, 0x80000, 0x4000000) bind(r6, &(0x7f0000000080)=@llc={0x1a, 0x336, 0x7, 0xa, 0x7, 0x7f}, 0x80) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="400000001400010000000000000000000a009e00", @ANYRES32=r7, @ANYBLOB="140002ff010000000000000000000000000003000000060001800600"/40], 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB="a0000000", @ANYRES16=0x0, @ANYBLOB="00012bbd7000fbdbdf250100000008000100", @ANYRES32=r2, @ANYBLOB="84000280400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004000300000008000600", @ANYRES32=r4, @ANYBLOB="40000100240001006c625f706f72745f737400cdd26ded080000000004000400"/70, @ANYRES32=r7, @ANYBLOB], 0xa0}, 0x1, 0x0, 0x0, 0x20040008}, 0x80) [ 901.331288][T15730] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 901.360047][T15730] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 901.386423][T15738] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 901.422969][T15740] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 09:03:13 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RREADLINK(r1, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) 09:03:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:15 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000100)=""/141) 09:03:15 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r6) r7 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r7, &(0x7f00000002c0), 0x40000000000009f, 0x0) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYRESOCT=r8, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES32=r7], @ANYRESHEX=r6, @ANYRESDEC=r4]) keyctl$chown(0x4, r0, r2, r5) 09:03:15 executing program 4: setsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, &(0x7f0000000040)=0x1, 0x4) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x502, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:15 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 904.062297][T15786] QAT: Invalid ioctl [ 904.140933][T15791] QAT: Invalid ioctl 09:03:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) sendmsg$AUDIT_GET_FEATURE(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x48004000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x3fb, 0x4, 0x70bd28, 0x25dfdbfc, "", ["", "", "", "", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x4004}, 0x40080) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2084c0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r2, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRES16=r1, @ANYBLOB=',mft_zone_multiplier=0']) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000040)={{0x1, 0x0, @reserved="7fae1e35b5480683593b2620ed49a3b764febc58c51510565f5696fce55e7b8a"}}) 09:03:15 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:15 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB="09000000bc69706c6900000000000000000000000000007b2d3c"]) 09:03:16 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000040)) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000800c000000020000000000000000000004000000000000"], 0x0, 0x26}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, [], 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={r4, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x1a, 0x2, &(0x7f0000000240)=@raw=[@map_val], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r5}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r2, 0x10, &(0x7f0000000100)={&(0x7f0000000080)=""/20, 0x14, r5}}, 0x10) ioctl$MON_IOCH_MFLUSH(r2, 0x9208, 0xa4) 09:03:16 executing program 1: syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x4100042, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) socket$kcm(0x29, 0x2, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup3(r1, r2, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x4, 0x1, 0x302, 0x0, 0x0, {0x7}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8045}, 0x884) 09:03:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:18 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') setsockopt$SO_BINDTODEVICE_wg(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000240)='wg0\x00', 0x4) sendmsg$NLBL_MGMT_C_REMOVEDEF(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x84, r2, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @broadcast}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x28}, @NLBL_MGMT_A_DOMAIN={0x9, 0x1, 'ntfs\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x3}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000040}, 0x4800) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:18 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000100)={0xffa, 0x2, 0x3f, 0x1, 0x401}) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x9, 0x400000) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)={0x1, [0x4260]}, 0x6) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) [ 906.887480][T15852] __ntfs_error: 15 callbacks suppressed [ 906.887487][T15852] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 906.953890][T15855] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 906.985037][T15855] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 906.999882][T15864] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 09:03:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB="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"]) 09:03:18 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:18 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$NBD_CLEAR_QUE(r1, 0xab05) [ 907.181272][T15873] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier option argument: 0‹Q0™s$g¢maÓ#g´tÃMa£XÑôžñ²TFîuŠÅ¢Â@¶°Lp¯ Í8ÚßéQËJíL˜v¿^bip»|ZÏbIã 09:03:18 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="666d61886b3d30303030303030303030303030303030303030303030302c64697361626c655f7370617273653d6e6f2c636173655f73656e736974697665"]) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f00000001c0), &(0x7f0000000200)=0x2) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000000400)={0x0, 0xfd88, &(0x7f0000000300)={&(0x7f00000003c0)={0x2c, r4, 0x401, 0x0, 0x0, {{}, {}, {0x8, 0x13, @l2={'eth', 0x3a, 'veth1_to_hsr\x00'}}}}, 0x2c}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r4, 0x50079346d6e41485, 0x70bd26, 0x25dfdbfd, {{}, {}, {0x8, 0x11, 0xfffffffb}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20008004}, 0x40088d0) 09:03:18 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ptrace$cont(0x7, r0, 0x0, 0x0) [ 907.277410][T15884] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier option argument: 0‹Q0™s$g¢maÓ#g´tÃMa£XÑôžñ²TFîuŠÅ¢Â@¶°Lp¯ Í8ÚßéQËJíL˜v¿^bip»|ZÏbIã [ 907.362797][T15889] ntfs: (device loop1): parse_options(): Unrecognized mount option fmaˆk. 09:03:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r4}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r8}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0/file0\x00', 0xbca2, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) [ 907.448848][T15889] ntfs: (device loop1): parse_options(): Unrecognized mount option fmaˆk. 09:03:19 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="666d61736b3d3030303030303030303030303030301030b030303030302c64697361626c655f73700002000f00000000636173655f73656e736974697665"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vga_arbiter\x00', 0x8200, 0x0) syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0/file0\x00', 0x1, 0x4, &(0x7f0000000400)=[{&(0x7f0000000100)="d399d071b87d6f721668f502953b7dc9770a2500123f35b2fccf04c5c71bb72e1d83fa2fac8dc3e611d8d729963c6aca5386766f67445fbdea9ff61526ac68a8f6a4b80e2126fcb9e752bfec5fd2fd", 0x4f, 0x8}, {&(0x7f0000000180)="6ba6205145ae31636645717a8325fb6d717242f5c4fab6782dd7ea6ba48b1b0b01f2d9165e680b8c31a679ef0e9725ab967760c6cea2bff07569bed2147b9d17d60b433c99c74f6b18ca4a6e7a89b5d9c9ed66d331dc969e6786378a8d0690ea3da416046bdd4713be84448c24fa6b59ee828a1eb417b0c4aa57aba4c6c3b12c6f736a4a17fc4cd527915f0b33921d0438ae6f1cf2d539ffac7bebb46234d8d67145cc56cb77611f1aaf4c5fd8dec53c0b67656aec2d5257ea52b793e9730da9fc2691ad71cff5654dc1e882b2bd9ef9d5bc4f6788", 0xd5, 0x42d3}, {&(0x7f0000000300)="00ca9a0d35770bca2559e1280bf0782160fc9efe20895a0e1e29610726c706ee0728ab2d15adf6e5438eed4ef2bb94d94aee945791cf73f47ef06685b48538046ce4fcf198efde82b197ef0c9b329414f662a17c96061f5c1fd08e2c64ece65b14f475f866b7e4ff3568a0c1ccc896bb9efac6889648968013081c4cd1e824320b2e33990f1227b78c0d9c62adb27e64726d682c53287dee02bad199c3cb56d0c6db415a085f5ed642b8edf680152180959dcfa73d8ab689e482df4bec8271505b4928a960e814efa849bd38fbb3ebe31af0f484c6d2665f04743a441d1a7a7d17e90386", 0xe4, 0x9}, {&(0x7f0000000280)="806080", 0x3, 0x80000001}], 0x22400, &(0x7f0000000540)={[{@shortname_mixed='shortname=mixed'}, {@rodir='rodir'}, {@shortname_win95='shortname=win95'}, {@nonumtail='nnonumtail=1'}, {@numtail='nonumtail=0'}, {@shortname_mixed='shortname=mixed'}, {@uni_xlate='uni_xlate=1'}, {@rodir='rodir'}], [{@fsmagic={'fsmagic', 0x3d, 0x4}}, {@smackfsdef={'smackfsdef', 0x3d, 'ntfs\x00'}}, {@fsname={'fsname', 0x3d, ':-$(^wlan0keyring}F:wlan0'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@audit='audit'}, {@dont_measure='dont_measure'}, {@audit='audit'}, {@euid_gt={'euid>', r0}}]}) listxattr(&(0x7f0000000680)='./file0/file0/../file0\x00', &(0x7f00000006c0)=""/185, 0xb9) [ 907.599327][T15911] ntfs: (device loop1): parse_options(): Invalid fmask option argument: 0000000000000000°00000 09:03:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x101, 0x50000) ioctl$BLKSECTGET(r2, 0x1267, &(0x7f0000000080)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_PPC_ALLOCATE_HTAB(r4, 0xc004aea7, &(0x7f0000000100)=0xffff0000) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) [ 907.787776][T15911] ntfs: (device loop1): parse_options(): Invalid fmask option argument: 0000000000000000°00000 09:03:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000100), 0x4) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000080)={r6}, 0x14) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000040)={r6, 0x80}, &(0x7f0000000080)=0x8) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:21 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket$netlink(0x10, 0x3, 0x13) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) 09:03:21 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) unshare(0x400) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:21 executing program 1: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x3b83e, &(0x7f00000002c0)=ANY=[@ANYRES16=r0]) 09:03:21 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) unshare(0x400) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e22, 0x1, @mcast2, 0x10001}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x22}}, @in6={0xa, 0x4e21, 0xeab, @rand_addr="73820f2185bc9675711005f4589c210e", 0x7d}], 0x68) 09:03:22 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400204) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r4}, 0x14) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r4, 0xfffffc00}, &(0x7f0000000080)=0x8) 09:03:22 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) unshare(0x400) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:24 executing program 4: getpeername$tipc(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x10) openat$nvram(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nvram\x00', 0x100, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:24 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="666d61736b301e30303006103030302c646973616274655f7373656e101e7469f665"]) getresuid(&(0x7f0000000080), &(0x7f0000000100)=0x0, &(0x7f0000000140)) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) chown(&(0x7f0000000040)='./file0\x00', r0, r1) 09:03:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) unshare(0x400) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) [ 912.824232][T16027] __ntfs_error: 17 callbacks suppressed [ 912.824240][T16027] ntfs: (device loop1): parse_options(): Unrecognized mount option fmask0000000. [ 912.863617][T16029] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 912.880992][T16033] ntfs: (device loop3): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 912.920969][T16027] ntfs: (device loop1): parse_options(): Unrecognized mount option disabte_ssentiöe. 09:03:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 912.955392][T16029] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 912.964972][T16033] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 913.124092][T16027] ntfs: (device loop1): parse_options(): Unrecognized mount option fmask0000000. [ 913.144520][T16027] ntfs: (device loop1): parse_options(): Unrecognized mount option disabte_ssentiöe. [ 913.162008][T16053] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 913.189498][T16053] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 09:03:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:24 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:24 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x80040) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000080)) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) kcmp(r1, r2, 0x2, r4, r0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="666d61736b3d3030303030303030303030303030303001000000303059993a381c3e9e7a06cd302c64697361626c655f7370617273653d6eae40bcfdba116f2c636173655f83656e73697469766519c18a53466d46b4a2a873736faebafa2f5ae96ad9ee0c0000000000001000fa5c8fc6e1ef54b3a155849bbe00f842546d07c003ef5f2163cd04de41b66e74f31df8e973ac60182568e5bd0679415a28120260ffb53c34df10f5e59093368274dfeadfc0be"]) ioctl$TIOCL_GETKMSGREDIRECT(0xffffffffffffffff, 0x541c, &(0x7f0000000100)) 09:03:24 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000080)) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, 0x2, 0x6, 0x5, 0x0, 0x0, {0xa, 0x0, 0x4}, [@IPSET_ATTR_DATA={0x24, 0x7, 0x0, 0x1, [@IPSET_ATTR_MAXELEM={0x8}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x8001}, @IPSET_ATTR_PROBES={0x5, 0x15, 0x3f}, @IPSET_ATTR_SIZE={0x8, 0x17, 0x1, 0x0, 0x2}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4026000}, 0x20000040) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="666d6f736b3d3030303030303030303030301e303030303030303030302c64697361626c2c636173655f73656e7369746976653d6e6f2c6769643d79a7e820009ca807003157ed05945b3c54437cc60525d199b966e0e7406278bee85aba9c2bd927059485e8fafa39b4446b4d62252a6eb04379c6c0be249d3d3a8ebd71013935713abf23a20bd47d3b58adb180ce41a67979e7636d7f42e79dbff0d82ab8935ab875161a6498fcf336cccf48f595bcbb15b49f1396ede82fbff70e591a6a0c8c24b00f83f1e877f2f4da62cab5c95cc0964121a8cfbc90d851abd2229519048a63f6d17c000000000049d91254e0e86186e07a66e6b8fdf3c5405edb6172e751518e4a0a629c2ac01765ea94f9c05ceef2c1ff1b77789176ad37fd7a68254e51a6801272a4eb755f19f5abfb5092a0521ddd03f0cbd68fd8c9b3eb2044101aa4633603b8639112cafcf1345b8d9ebdd46d8e4f694893f3a13a", @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) sendmsg$IPSET_CMD_LIST(r0, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x30, 0x7, 0x6, 0x201, 0x0, 0x0, {0x0, 0x0, 0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0xc1) 09:03:24 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000180)) r2 = dup2(r0, r0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(0xffffffffffffffff, 0xc1004110, &(0x7f0000000300)={0x5, [0x2, 0x3, 0x962], [{0x3, 0x2c, 0x0, 0x1, 0x1}, {0x4, 0x3, 0x1, 0x1, 0x0, 0x1}, {0xffffffff, 0x2}, {0x101}, {0x0, 0x7f, 0x0, 0x1, 0x1, 0x1}, {0x6d, 0x122, 0x0, 0x0, 0x1, 0x1}, {0x4, 0x100, 0x1, 0x1, 0x0, 0x1}, {0x200, 0x6, 0x0, 0x1, 0x1}, {0x9, 0x2, 0x0, 0x1, 0x1}, {0x80, 0x100, 0x1, 0x1, 0x1, 0x1}, {0x800, 0x7, 0x0, 0x0, 0x0, 0x1}, {0x6, 0x0, 0x1, 0x1, 0x1}], 0x3}) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x13, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x26, 0x0, 0xffff}, [@call={0x56}]}, &(0x7f0000000140)='GPL\x00', 0x5, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x23) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRES32=r0, @ANYRESDEC=0x0, @ANYRES16, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES64=r2, @ANYRES16=0x0], @ANYPTR64, @ANYBLOB="66629e1d1c5823e90822bce4b9f2baa152373499a5fb", @ANYRES64=r0, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYPTR64], @ANYRES64=0x0]]) 09:03:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$XDP_MMAP_OFFSETS(r3, 0x11b, 0x1, &(0x7f0000000040), &(0x7f0000000100)=0x80) 09:03:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x104, 0x0, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x30, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}]}, @TIPC_NLA_MEDIA={0x14, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NODE={0x20, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK={0x90, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xfffffff7}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x100}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x1}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x0, 0x2, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}]}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x40080}, 0x22) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) 09:03:27 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = semget$private(0x0, 0x2, 0x0) semctl$SEM_STAT_ANY(r1, 0x0, 0x14, &(0x7f0000000000)=""/83) semctl$GETVAL(r1, 0x1, 0xc, &(0x7f0000000200)=""/80) sendmmsg(r0, &(0x7f00000002c0), 0x40000000000009f, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) readahead(r3, 0x76, 0x4d4) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="b428bbc456fc0f6497df276acb43a8c57d11ee3df9e74886299f6451d5ff0d90768834306497174d1550bb716209d59c", @ANYRESOCT=r0, @ANYRESOCT=r0, @ANYRES32=r2, @ANYRESDEC, @ANYBLOB="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", @ANYRES16, @ANYRESHEX=0x0, @ANYRES16=0x0]) 09:03:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:27 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r6}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x200, 0x8, 0x0, {0xa, 0x0, 0x0, 0x0, r6}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8003, 0x10000074}}]}, 0x40}}, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x200000000001f, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRES64=r4, @ANYRESHEX=r2, @ANYRESDEC=r1]) 09:03:27 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="666d61736b3d30303030303030303030303030303030303030303030302c64697361626c655f7370617273653d6e6f2c636173655f73656e736974697665579a1fcd72848fb5efb441772bcf225fd15a3a655f28511757043d55b851531205006e5a51dea6d49098077c57eb63c0f7b609904ed52f148cb19201ecb5386a69d906e33fa1cd99d7b90ee55c23aeeaed6f1d146ed441daf926d50624e5106596e1a6fecfc77bf1551db7e9859d545fe595b04006a34b6e78d4ce95dab67a32fa510e25aab05633a4c077e65744"]) 09:03:28 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:28 executing program 3: socket$netlink(0x10, 0x3, 0x0) unshare(0x400) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:28 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket(0x37, 0x2, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000001600)) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0xa, &(0x7f00000014c0)=[{&(0x7f0000000100)="0ac8af776cae79c5d6f35bef7ebd6b15f6defad259042291b5ca8a77b98abb0408543cb42b6895b81d5c75f6e8403e2704c6a45cdad2bfe3a6abec5c26696d96d219bb7febe43ad22a818d72d2b80adec7e02cb933f25de1b5c2bea458093c5bd504ebabc8172468e91af075878a86b110bbb2bc92e5f6841c8437f2339ed8e638b68f937f1cf06c87c9ba75329297c4ad1b8e96a157c757e267a0", 0x9b, 0x3}, {&(0x7f00000001c0)="40f8afa75df675c9330f49b06ff4fff07158019d6a87d55a1bc3cc67f4a91b3a5fb8aa51f2", 0x25, 0xff}, {&(0x7f0000000200)="cc407e1520a1b45e802648cb86346d4b9eb232baa347beebf2f0656fd38378613c5770d7459491b60ac6b556259bb35eec97b4aff808ec9c12ef1905a1f1e50f180d19cd097e362cd19e1b6b6cf03dba2bdb358b51c9", 0x56, 0x6}, {&(0x7f0000000300)="1ae1d7da974d20bb2142ab2289f88493330510c0c686df5e7b90ec26aeb11c66fe7cb9f04ffa066ada451e94669f19a5d17d1de4d2c007752697f0304613a885d18155b2419698eb1df0eed30413dd0824831bf82b3e0f64a399eb2f16a58bad5245cf4204539c", 0x67, 0x10000}, {&(0x7f0000000280)="19ea0bf027bd95bf443bd3e1894d2e1d409acb88ef214743dd2fb1ee340339ba", 0x20, 0x3}, {&(0x7f0000000380)="73d82bcee95adb66d9fc9ae26f78e994f9d9a5f55b69cfafe048123654553a250d73a79790893527b0a90507697db2412d58816235", 0x35, 0x5}, {&(0x7f00000003c0)="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", 0x1000, 0xd803}, {&(0x7f00000013c0)="ed2045399b2c6b2df823be8ee5", 0xd, 0x1}, {&(0x7f0000001400)="89ccc4b76ac0575294d70f07b2e3b09fafb298a5f6a125a7eeb915e561fa436da605ce46e5a40dfae2fe48c583540d0476bf4993", 0x34, 0x3}, {&(0x7f0000001440)="0b36aa33fa5475ea39a551e3b972b8791cfd0294e957775241df89bae4e519a3dfbe72590bd620cba3a797991f77c564d62f122a0e72f0c6bcc34902de4297af05c905f4bfd3562d03409e8e08207ace9de6c2a0f10fe8cba44ad32ee9c6e3accf30f9f792146d8d460320c920b6a6d78b107806ec31d368d4f612e86ef0fd3d", 0x80, 0x8}], 0x10000, &(0x7f00000015c0)=ANY=[@ANYBLOB="6e6f646f74732c64968a636172642c646f6e745f686173682c00"]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) 09:03:28 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) r2 = accept4(r0, &(0x7f0000000040)=@tipc=@id, &(0x7f0000000240)=0x80, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="400000001400010000000000000000000a000000", @ANYRES32=r4, @ANYBLOB="14000100000000000000000000000000000000001400060001800000740000000000000000000167"], 0x40}}, 0x0) recvfrom$packet(r2, &(0x7f0000000340)=""/4096, 0x1000, 0x8001, &(0x7f0000000140)={0x11, 0xf7, r4, 0x1, 0xff, 0x6, @multicast}, 0x14) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r5, @ANYBLOB="2c6d66745f7a6f6e655f6d756c7469706cde876965723d303aadaf6caddc604ac711457f6e404377943d2d2df22637462dbed13b66eef79f16ead4a013a3a052616f929bf5be41b1ce4d14fe40782ec12cae22c1423954981899c3843e2faec8e0d06731cf88250e41c4898ce2980f346052ffd925da0d7a2dad960bb67530868b248d7a97769ed75a4dbd44e374bfc1bcabb38127cef84e67864d46ad2b5d9c6db805"]) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044844eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b700000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049dd5c00000000000006ad8e4ecc326d3a020000005400"}, 0x80) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='bic\x00', 0x4) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r8}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000001c0)={'vxcan1\x00', r8}) 09:03:28 executing program 3: unshare(0x400) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:30 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:30 executing program 1: syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5e9, 0x65a800) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$x25(r4, &(0x7f0000000080)={0x9, @null=' \x00'}, 0xcc6d291d) 09:03:30 executing program 3: unshare(0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0']) [ 918.934563][T16205] __ntfs_error: 28 callbacks suppressed [ 918.934572][T16205] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0xffffffffffffffff 09:03:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:30 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x7fff, 0x0, 0x0, 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="666d61736b3d303030306ebf937ceaae36df9b238491303030303030303030303030303030303030302c64697361626c655f7370617273653d6e6f2c636173655f73656e7369746976653d6e6f2c6769644b", @ANYRESHEX=r1, @ANYBLOB="2c6d66745f7a6f6e655f01006c7469706c6965722d2d44eea248a9af85b6ef5487be89082d44781bb2b4940c6747ae69e2087a2a55d71fc448750b80d9fd3c15aab2b048e4360de65ffa5d05328dc5307135c4f769fbb9d9a5900c82e4c6b6fa7d03701acb491995ca4c0e7b01a4aed6966bc3cfb18bd7b2d50d065fc6ff3deda6269aa167fc28b8003146ac03854ff2f17b39231135276a96be5b58f06e7da1ceb1484047a2b96174eb121f2a8317"]) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x4, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f0000000340)) sendmsg$NFT_MSG_GETFLOWTABLE(r2, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x5c, 0x17, 0xa, 0x801, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFTA_FLOWTABLE_HOOK={0xc, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x20}]}, @NFTA_FLOWTABLE_HOOK={0x24, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_NUM={0x8}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x1}]}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0xc0}, 0x4) 09:03:30 executing program 3: unshare(0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:30 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000440)={'vlan1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000480)=@deltclass={0xf4, 0x29, 0x300, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, r2, {0x6, 0x10}, {0x0, 0xffff}, {0x0, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x2, 0x4}}, @tclass_kind_options=@c_fq_codel={0xd, 0x1, 'fq_codel\x00'}, @tclass_kind_options=@c_hfsc={{0x9, 0x1, 'hfsc\x00'}, {0xa4, 0x2, [@TCA_HFSC_USC={0x10, 0x3, {0x401, 0x7fff, 0x3}}, @TCA_HFSC_FSC={0x10, 0x2, {0x6, 0x3}}, @TCA_HFSC_RSC={0x10, 0x1, {0x3, 0x1, 0x2}}, @TCA_HFSC_RSC={0x10, 0x1, {0x7, 0x7, 0x9}}, @TCA_HFSC_FSC={0x10, 0x2, {0x8, 0x45f, 0xff}}, @TCA_HFSC_RSC={0x10, 0x1, {0x6, 0x0, 0x8}}, @TCA_HFSC_FSC={0x10, 0x2, {0x20, 0xffffff69, 0x10000}}, @TCA_HFSC_RSC={0x10, 0x1, {0x200, 0x0, 0xed}}, @TCA_HFSC_USC={0x10, 0x3, {0x1, 0x10001, 0x80000001}}, @TCA_HFSC_USC={0x10, 0x3, {0x1, 0x7, 0x1000}}]}}, @TCA_RATE={0x6, 0x5, {0x3, 0x8}}]}, 0xf4}, 0x1, 0x0, 0x0, 0x8000}, 0x4011) r3 = creat(&(0x7f0000001140)='./file0\x00', 0x0) close(r3) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0xffaf) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc]}}, r5}}, 0x48) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f00000001c0), r5, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r5, 0x5, 0x0, 0x0, 0x0, @ib={0x1b, 0x7fff, 0x5, {"63732df39a899500d30b74d327bd4ecb"}, 0xd38, 0x1efab622, 0xffff}, @in6={0xa, 0x4e20, 0xfffffbff, @dev={0xfe, 0x80, [], 0x3a}, 0xffffffff}}}, 0x118) 09:03:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 919.424879][T16220] ntfs: (device loop4): parse_options(): Invalid fmask option argument: 0000n¿“|ê®6ß›#„‘0000000000000000000 [ 919.448059][T16224] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 919.528876][T16227] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0xffffffffffffffff 09:03:31 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) truncate(&(0x7f0000000040)='./file0\x00', 0x3ff) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) mount$9p_xen(&(0x7f00000000c0)='syz\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x2000, &(0x7f0000000300)={'trans=xen,', {[{@version_L='version=9p2000.L'}, {@version_9p2000='version=9p2000'}, {@version_L='version=9p2000.L'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ntfs\x00'}}, {@euid_eq={'euid', 0x3d, r1}}, {@euid_gt={'euid>', r2}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}}) 09:03:31 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={r4}, 0x14) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000000)={r4, 0x1}, 0x8) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1200000, &(0x7f0000000100)=ANY=[@ANYBLOB="666d61736b3d30303030303030303030303030303030303030303030302c646906c9ed6c655f7370617273653d6e6f2c636173655f73656e7369746976653d6e6f2c6769643d9e0b11b1d934e9355b1b8a5c145b3be3459d3e96d6990463ebbfadabcf3a706a259c34", @ANYRESHEX=r6, @ANYBLOB=',mft_zone_multiplier=0']) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$EVIOCGID(r8, 0x80084502, &(0x7f00000001c0)=""/211) r9 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r10) setsockopt$inet6_IPV6_XFRM_POLICY(r8, 0x29, 0x23, &(0x7f00000002c0)={{{@in=@remote, @in=@broadcast, 0x4e20, 0x4, 0x4e21, 0x0, 0x2, 0x20, 0x80, 0x88, 0x0, r10}, {0xebb, 0x5dd, 0x2, 0x7fffffff, 0x9, 0x4, 0xfffffffffffffffa, 0x3ff}, {0x8000, 0x985d, 0x42, 0x48cc691b}, 0x1, 0x0, 0x2, 0x1, 0x1, 0x2}, {{@in=@broadcast, 0x4d4, 0x32}, 0x2, @in=@multicast1, 0x0, 0x0, 0x1, 0x40, 0x3, 0x1f, 0x5}}, 0xe8) 09:03:31 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 919.725090][T16253] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 919.789610][T16257] ntfs: (device loop4): parse_options(): Unrecognized mount option diÉíle_sparse. [ 919.808581][T16257] ntfs: (device loop4): parse_options(): Invalid gid option argument: ž ±Ù4é5[Š\[;ãE>–Ö™cë¿­«Ï:pj%œ40x00000000ffffff00 09:03:33 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:33 executing program 3: unshare(0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:33 executing program 1: r0 = socket(0x2b, 0x800000003, 0x7fffffff) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x27) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x101, 0xffffffffffffff4a, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r0]) r1 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x40000000000009f, 0x0) 09:03:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='cubic\x00', 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r3, @ANYBLOB="2c6d66745f7a6f6e655f6d75877469706c6965723d30"]) [ 921.977612][T16274] ntfs: (device loop3): parse_options(): Invalid gid option argument: 0xffffffffffffffff [ 921.998329][T16275] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_zone_mu‡tiplier. 09:03:33 executing program 3: unshare(0x400) syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0']) [ 922.155742][T16289] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_zone_mu‡tiplier. 09:03:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_GET_VERSION(r3, 0x8004552d, &(0x7f0000000040)) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:33 executing program 3: unshare(0x400) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:34 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r3, 0xc0106426, &(0x7f0000000100)={0x3, &(0x7f0000000080)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000180)={r4, &(0x7f0000000140)=""/26}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r5, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:34 executing program 3: unshare(0x400) syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 09:03:34 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:34 executing program 1: chdir(&(0x7f0000000040)='./file1\x00') setxattr$security_evm(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f0000000100)=ANY=[], 0x0, 0x0) 09:03:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r6) r7 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r7, &(0x7f00000002c0), 0x40000000000009f, 0x0) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYRESOCT=r8, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES32=r7], @ANYRESHEX=r6, @ANYRESDEC=r4]) keyctl$chown(0x4, r0, r2, r5) 09:03:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x102, 0x0) sendto$l2tp(r2, &(0x7f0000000100)="522e0fcbff890f70c4439c5e250695f3f4057d2e250f1589e5e755b67a0590084f9ea7ffd887663f08538c369869a5b73766428f7534c4840f51dc737ac919b3c6eb77128106ff0858867d09843ef92a6e71d490b35d4183ed1535d725fc382c8581", 0x62, 0x40800, &(0x7f0000000180)={0x2, 0x0, @multicast1, 0x2}, 0x10) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mfT_zone_multiplier=0']) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x33) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) ptrace$getregs(0xc, r3, 0x8001, &(0x7f0000000040)=""/21) 09:03:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="666d6174a7b1000030303030303030303030302c440a02005d4da0303030307361626c655f7370617273653d6e6f2c6361737c55c6717467406e2ccf01601165c573656e73697469766500"]) [ 925.033828][T16353] __ntfs_error: 8 callbacks suppressed [ 925.033836][T16353] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 925.053688][T16356] ntfs: (device loop4): parse_options(): Unrecognized mount option mfT_zone_multiplier. [ 925.063884][T16354] ntfs: (device loop1): parse_options(): Unrecognized mount option fmat§±. [ 925.184587][T16354] ntfs: (device loop1): parse_options(): Unrecognized mount option fmat§±. 09:03:36 executing program 1: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RREADDIR(r1, &(0x7f0000000100)={0xbf, 0x29, 0x2, {0x7, [{{0x2, 0x3, 0x1}, 0x4, 0x20, 0x7, './file0'}, {{0x4, 0x4, 0x7}, 0x7, 0x2, 0x7, './file0'}, {{0x40, 0x0, 0x2}, 0x81, 0x8, 0x7, './file0'}, {{0x40, 0x0, 0x2}, 0x7, 0x0, 0x1, '.'}, {{0x8, 0x1}, 0x2, 0x6, 0x7, './file0'}, {{0x8, 0x3, 0x2}, 0x2, 0x3f, 0x7, './file0'}]}}, 0xbf) [ 925.346348][T16378] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 09:03:37 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 09:03:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="ffffffff0000003d45000000080000000a000000", @ANYRES32=r4, @ANYBLOB="140001000000000000000000000000000000000014000600018000007400"/40], 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000e00)={'team0\x00', r4}) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r7}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getsockopt$inet_IP_XFRM_POLICY(r8, 0x0, 0x11, &(0x7f0000001680)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6}}, &(0x7f0000001780)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000017c0)={@empty, 0x0}, &(0x7f0000001800)=0x14) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f00000024c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000002480)={&(0x7f0000001840)={0xc2c, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, [{{0x8}, {0x268, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x5}, {0xf, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x5}, {0x8, 0x4, 0xc}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x8000}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x3}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x234, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0xfffffff7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x14, 0x4, [{0x2, 0x40, 0x5}, {0xfc01, 0x8, 0x0, 0x7}]}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x3ff}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}]}}, {{0x8}, {0x18c, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x8000}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0x8001}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8}, {0x208, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x10000}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8, 0x4, 0xab6}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x4ff5}}, {0x8}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x2c, 0x4, [{0x1, 0x8, 0x3, 0x2}, {0x2000, 0x5, 0x4}, {0x940, 0x8, 0x6, 0x800}, {0xfc01, 0xfe, 0x40, 0x3}, {0x1, 0x5, 0x1f}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0x80, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x60}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x16c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x80}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0xfffffffd}}, {0x8}}}]}}, {{0x8}, {0xc0, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8, 0x4, 0x10000}}, {0x8, 0x6, r2}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r7}, {0xfc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r9}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x1}}}]}}]}, 0xc2c}, 0x1, 0x0, 0x0, 0x8000}, 0x48040) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 925.602074][T16388] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 09:03:37 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x30]}}}}]}) [ 925.666297][T16388] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 09:03:37 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x30]}}}}]}) 09:03:37 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:37 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f", 0x1}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 925.906788][T16388] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 925.938671][T16388] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 09:03:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a"], 0x0, 0x36}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:39 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r6) r7 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r7, &(0x7f00000002c0), 0x40000000000009f, 0x0) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYRESOCT=r8, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES32=r7], @ANYRESHEX=r6, @ANYRESDEC=r4]) keyctl$chown(0x4, r0, r2, r5) 09:03:39 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x30]}}}}]}) 09:03:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) r2 = socket$caif_seqpacket(0x25, 0x5, 0x4) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, @vsock={0x28, 0x0, 0x2711, @my=0x0}, @ethernet={0x306, @local}, @l2={0x1f, 0x9, @fixed={[], 0x10}, 0x101}, 0x401, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000040)='virt_wifi0\x00', 0x6, 0x100000001, 0x9}) [ 928.045787][T16426] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:03:39 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x30]}}}}]}) 09:03:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() ptrace$setopts(0x4206, r3, 0xf3, 0x20) tkill(r3, 0x33) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) ptrace$cont(0x20, r3, 0x0, 0x100) fcntl$setown(r0, 0x8, r2) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYRESOCT]) 09:03:40 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x30]}}}}]}) 09:03:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f0000000040)={0x2, 0xf42, 0x80, 0x0, 0x23}, 0xc) 09:03:40 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x30]}}}}]}) 09:03:40 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r6) r7 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r7, &(0x7f00000002c0), 0x40000000000009f, 0x0) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYRESOCT=r8, @ANYPTR64=&(0x7f00000001c0)=ANY=[@ANYRES32=r7], @ANYRESHEX=r6, @ANYRESDEC=r4]) keyctl$chown(0x4, r0, r2, r5) 09:03:40 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:40 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a"], 0x0, 0x36}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = timerfd_create(0x6, 0x800) timerfd_gettime(r1, &(0x7f0000000040)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r3, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:42 executing program 1: syz_mount_image$tmpfs(0x0, &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x30]}}}}]}) 09:03:42 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) r6 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r6, &(0x7f00000002c0), 0x40000000000009f, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) keyctl$chown(0x4, r0, r2, r4) [ 931.120384][T16505] __ntfs_error: 9 callbacks suppressed [ 931.120392][T16505] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:03:42 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x30]}}}}]}) [ 931.252686][T16508] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 09:03:42 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x30]}}}}]}) [ 931.311239][T16508] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 09:03:42 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:43 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x30]}}}}]}) [ 931.548178][T16538] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 09:03:43 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) r6 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r6, &(0x7f00000002c0), 0x40000000000009f, 0x0) r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) keyctl$chown(0x4, r0, r2, r4) 09:03:43 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 931.722236][T16552] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:03:43 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:43 executing program 4: socket$netlink(0x10, 0x3, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disabse=no,case_sensitive=no,gid=\x00\x00\x00\x00\x00\x00\x00', @ANYRESHEX, @ANYBLOB=',mft_zone_multiplier=0']) [ 932.035471][T16569] ntfs: (device loop4): parse_options(): Unrecognized mount option disabse. [ 932.048034][T16569] ntfs: (device loop4): parse_options(): The gid option requires an argument. 09:03:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a"], 0x0, 0x36}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:45 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 09:03:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB="2c6d66745f7a6f6e655f6d756c7469706c6965723d307f78d8a209ef75cb85fba5098e3de234fb701bb88b8a1d227d7266fe823d1701bf8f5db1292fc747ffde7e69007837f76133bbcca590a3ddf881d02a06f282be2f25978221feae79465488eace76a0db47a07bb6d9684b1febcb6357df027c47b817d82b9584ff30f3ae7568962117073eb8492b21b55ce0296f3124ca8d29c601b07c9744295127c4e1097de3d6ca65c12fda9a5eb92d3944cd3a61db9225e159ac023965a4aed7d20f7fa5d12e3a80d5fff25ca6dbfa862ef6df"]) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r2, r2) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000040)) 09:03:45 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) r6 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r6, &(0x7f00000002c0), 0x40000000000009f, 0x0) socket(0x11, 0x800000003, 0x0) keyctl$chown(0x4, r0, r2, r4) [ 934.201389][T16587] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier option argument: 0xØ¢ ïuË…û¥ Ž=â4ûp¸‹Š"}rfþ‚=¿]±)/ÇGÿÞ~i [ 934.273686][T16589] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:03:45 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 934.407918][T16606] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier option argument: 0xØ¢ ïuË…û¥ Ž=â4ûp¸‹Š"}rfþ‚=¿]±)/ÇGÿÞ~i 09:03:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) open_by_handle_at(r0, &(0x7f0000000100)={0x83, 0x5, "051a0b146afa3dbf35d8878fe27e483a1556eea09d3bf09f07a9a2a7ed1962251a017283e9de19c0a6a577d02409c039e2a4f4e2b9faeb3d9d60ae669019b9b4372283518d4d274bbb38a49437ead804716eb552dbe17f10117ad8c0f305f648721604a149a4649f85e4f1c69277435c8d1a03c9b1e9d40c52b3b1"}, 0x190000) 09:03:46 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) r6 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r6, &(0x7f00000002c0), 0x40000000000009f, 0x0) keyctl$chown(0x4, r0, r2, r4) 09:03:46 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 09:03:46 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 09:03:46 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000140)='./file0\x00', 0x101480, 0x44) ioctl$VHOST_GET_FEATURES(r4, 0x8008af00, &(0x7f0000000180)) ioctl$TCSETAF(r3, 0x5408, &(0x7f0000000100)={0x6, 0x4, 0x20, 0x5, 0x13, "1ea9c4894db9bf94"}) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="666d61736b3d303030303030b5c93030303030303030303030303030302c64697361626c655f7370617273653d6e6f2c636173655f73656e7369743d6e0a121956e1626f2c6769643d", @ANYRESHEX=r1, @ANYBLOB="2c6d66745f7a6f6e65826d756c746902236965723d36"]) 09:03:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRES64], 0x0, 0x8}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:48 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) socket$netlink(0x10, 0x3, 0x0) keyctl$chown(0x4, r0, r2, r4) 09:03:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:48 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)) 09:03:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) r4 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r4, &(0x7f00000002c0), 0x40000000000009f, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="400000001400010000000000000000000a000000", @ANYRES32=r6, @ANYBLOB="140001000000582d1d3472c2f8e40000000000001400060001800000740000000000000000dd3bce"], 0x40}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000a40)={&(0x7f0000000240)={0x2, 0x4e21, @rand_addr=0x40}, 0x10, &(0x7f0000000900)=[{&(0x7f0000000280)="d73614e741670cc2bf37", 0xa}, {&(0x7f00000002c0)="294dfdf543187d03798a453e2c5016fc41933c68493bc43cac656e9933b351da57236b388c2545435f882afe3e8ed31ad2ca5bb613df14121e575258118a38d6643381a021aea9743dfc82ab5e4ccc930c72892cb398e6958a81f703973dc0c56fd7cf501f541fb4721ff129364748a308b6010b33f930493524b4d1de9793d95c94e44cec7ef93362d057e25a1318f0fcfa609597c62220969fca464d7ebf2bed23bf9c26aff48fc7cfa0fb", 0xac}, {&(0x7f0000000380)="93c2fb1bd46c64358c49051705b4292579e557ca4048f0a900e1a282c271ea25358615fbe9f49e1f840de209e6330e41246ac4c35d5f971a863592d80e14690229b9db8fec436a43ced8727fd573ccd1cfa4", 0x52}, {&(0x7f0000000400)="a33065003ec4a28d6064d5567b4ae263b7a9e410a64ac823693b0c923d718d3980f4c1a4bdfdcf53ac17300df7b401c764e82ee2853a05d7ce823598758a3e94c5798dfa220c74cc5cab474dc0c78fe6501819b52cd9cb8237a9892721b50c39bc6d272508a312e09f8fda48d305bfbace7eec7a2438250a125d37e5eeaf72dcd69ce4c77c2aa0e3d35e1c2c58121ac9a1affb05a6fe3fa512d5aa17d6556b424ea1841729e54fd21540a2e566dfeb07cd6bc80de9c582209985d4adaa5c4c3728d950360745b34b9e598f9881f2f3", 0xcf}, {&(0x7f0000000500)="c2c437a3b4e10fe10e617a378cf7dd658ff7bfcd20bc26df6e1372294071889cbc7abefc00fff1ce1582c1f67c57fa99f45b5d9c0425abdc83346da207fb44aeea8ab33339a4f93375fdf31089b33626784c1d851e394778d8b8d128ea559ab2de3cb803740bf2cb8e8fa70ec1a53d527be424798a1710de6ff4117f6274a8adbaf507e4cbac8e5958719abdbcd2fecd1b933f7218f8d34ea5cbba5e1d557480a9d38b763c4693f069316b3e3d4bdf13c24b034f366499e67809b0496586bcebae03", 0xc2}, {&(0x7f0000000600)="b26d0c358160d9b33c774a24390128a99ef1de69b78960811edb35370f9821e9e710d60511bd352f0b5cec203b2cdbefb968e128dd63ab6880315822865abc1691e33233eb2d663ee0ab64f625958e860ff528d20a5bdbcd23be0085269689136e3be60a5c3632c566217d2b84495ff867c44462d77edccae8bc2f263d6075a1b94f", 0x82}, {&(0x7f00000006c0)="8c37e34fecedaecb2d35f6aa8e1e69fc12eff97d5256aa862f276b5148889c427c948649edb43914ce90128875f4f4476a37fa041081215356a44efee4e2ad143b534e05a50eaef9b9a9722b1063afd4bb7d21747ce2ddc2de07968133dfe1e23c47979e4a362567", 0x68}, {&(0x7f0000000740)="e95ec4fd60e66c06a2340ef54886082705e6cf7fed94eede2b004ae6d10f939bde5db559f548efc0035491005113cdabe1477b068b6d96993d8c025a3fb3ab028976ea1ed9177cf0fe8a4967457352e602169fc6168cd5883e1c15209eb0fb9feaef005e8bfe482fe090a66a9c24d43499e5a03fa95fc61d1bc44217af0ce65b29aeddcc713c223992d2ea8b1549cc8091ec99f10c34ca14f2c10d662d8313c03f13df69d75a7f644e12afb2e56fe217058b9c7fe4339ee7d7e2e14d6a534fe39231b69c0e6cbc060f", 0xc9}, {&(0x7f0000000840)="f810cf8f04578a77b63ee78ff59e05dc7ef05bc9fadb67171bb7434f93b38f99612df24d6b5e8661a3e44531579af4", 0x2f}, {&(0x7f0000000880)="fc41ddf90c97b20b279d32512972dd6b4566bcb4ec53a56fa81244f4b0f21ac1111f37e356c3906cf76287d8ba3fedb6da3f2938b626f4b305c2bed070253fc32bc57e30ed46c0", 0x47}], 0xa, &(0x7f00000009c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @loopback, @dev={0xac, 0x14, 0x14, 0x28}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x80}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}], 0x68}, 0x48881) getsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl$UI_SET_LEDBIT(r3, 0x40045569, 0xb) tkill(0x0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, 0x0, 0x0, 0x0) ioctl$sock_FIOSETOWN(r5, 0x8901, &(0x7f0000000a80)) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff8e, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="666d617330303030303030303030302c64697361626c655f7370617273653d6e6f2c6397cfb9c61d49d7386f2c6769643d00000400"/70, @ANYRESHEX=r1, @ANYBLOB="70f7ffffff3d30"]) sendto$rxrpc(r3, &(0x7f0000000140)="8fb98e3e721891e89cf79c870d96e7ea7d5f985b6fc50618e826ef9c4ba6bcdbcb68ea9732f47c2e028084997fb686e454c37d0b729c6f4e307b97fee55871e2b909bdf5094fb008cff223263af1c848304518195afeb3809d1e0f5a169a501b536cec017bfbad3499a46572070c9b622a79d21b37c2115f4c70233b45b076fbf470f1d73ac03db240ab60d14ebe7cae2b3d256037c66d26e3baab80973da1c70e5689178fc492a6d568b6639efec0", 0xaf, 0x20004040, &(0x7f0000000200)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e21, @local}}, 0x24) prctl$PR_SET_SECUREBITS(0x1c, 0x14) [ 937.254112][T16673] __ntfs_error: 7 callbacks suppressed [ 937.254120][T16673] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:03:48 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative'}}}]}) [ 937.441456][T16691] tmpfs: Bad value for 'mpol' 09:03:49 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative'}}}]}) [ 937.643877][T16699] tmpfs: Bad value for 'mpol' 09:03:49 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative'}}}]}) [ 937.806557][T16704] tmpfs: Bad value for 'mpol' 09:03:49 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x0]}}}}]}) 09:03:49 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) keyctl$chown(0x4, r0, r2, r4) [ 937.960695][T16710] tmpfs: Bad value for 'mpol' 09:03:49 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:49 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x0]}}}}]}) [ 938.074003][T16715] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 938.163688][T16726] tmpfs: Bad value for 'mpol' 09:03:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRES64], 0x0, 0x8}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:51 executing program 1: syz_mount_image$tmpfs(&(0x7f0000002100)='tmpfs\x00', &(0x7f0000002140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x0]}}}}]}) 09:03:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) listen(r2, 0x4) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB="2c6d66745f7a6f6e00000000000100006c6965723d30a67d277ebb43cef2143f573f3180935d5c0c9fa05b58c2b0eb24"]) openat$smackfs_cipso(0xffffffffffffff9c, &(0x7f0000000040)='/sys/fs/smackfs/cipso\x00', 0x2, 0x0) 09:03:51 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$chown(0x4, r0, r2, r4) [ 940.235997][T16738] tmpfs: Bad value for 'mpol' 09:03:51 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f00000002c0)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3f}, 0x10, 0x0}, 0x0) close(r2) [ 940.296376][T16746] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_zon. [ 940.319541][T16749] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:03:51 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x20000000) 09:03:52 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x20000000) [ 940.457325][T16763] ntfs: (device loop4): parse_options(): Unrecognized mount option mft_zon. 09:03:52 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x20000000) 09:03:52 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x20000000) 09:03:52 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x90000, 0x0) ioctl$PIO_FONT(r1, 0x4b61, &(0x7f0000000080)="cda5f45b821526de3a30efa4b3f3") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r2, @ANYBLOB=',mft_zone_multiplier=0']) [ 941.154894][T16787] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 941.166529][T16787] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 941.233879][T16794] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 941.249039][T16794] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 09:03:54 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x20000000) 09:03:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRES64], 0x0, 0x8}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:54 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r0, r2, r4) 09:03:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x40000000000009f, 0x0) dup2(r3, r0) r4 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x7, 0x81) ioctl$MON_IOCX_GET(r4, 0x40189206, &(0x7f0000000200)={&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f00000002c0)=""/65, 0x41}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_INTERRUPT(r2, &(0x7f0000000080)={0x10, 0x0, 0x4}, 0x10) chroot(&(0x7f0000000040)='./file0\x00') r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_mount_image$ntfs(&(0x7f00000000c0)='ntfs\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0xa88fb6e95da9962f, &(0x7f0000000280)=ANY=[@ANYRESHEX=r6, @ANYPTR64=&(0x7f0000000240)=ANY=[@ANYRESHEX], @ANYRES16]) 09:03:54 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x20000000) 09:03:54 executing program 1: sendmsg$inet(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x20000000) [ 943.390422][T16813] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:03:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB="2c666fd38d5f936c7469706d6953723d3000"]) 09:03:55 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x20000000) 09:03:55 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x20000000) [ 943.552137][T16827] ntfs: (device loop4): parse_options(): Unrecognized mount option foÓ_“ltipmiSr. [ 943.673230][T16836] ntfs: (device loop4): parse_options(): Unrecognized mount option foÓ_“ltipmiSr. 09:03:55 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 09:03:55 executing program 1: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$inet(0xffffffffffffffff, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x20000000) 09:03:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$PNPIPE_INITSTATE(r3, 0x113, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) r6 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r6, &(0x7f00000002c0), 0x40000000000009f, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getpeername$packet(r8, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) sendmsg$nl_route_sched(r6, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=@deltfilter={0x1164, 0x2d, 0x2, 0x70bd26, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0x9db5b234a98d5aa8, 0x1}, {0xffe0, 0x10}, {0xfff3, 0xffff}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x1124, 0x2, [@TCA_BASIC_POLICE={0x41c, 0x4, [@TCA_POLICE_RESULT={0x8}, @TCA_POLICE_RATE={0x404, 0x2, [0x284, 0x8, 0x8000, 0xfa, 0x7b7a, 0x3, 0x4, 0x4, 0x10001, 0x4fd66232, 0x800, 0x7cb, 0x6e423126, 0x80000000, 0x401, 0x200, 0x1, 0x8000, 0x6, 0xffffffff, 0x4, 0x8, 0x8b, 0x5, 0x7, 0x2, 0x3, 0x100010, 0x80000000, 0x9, 0x3f, 0x4, 0x6, 0x80, 0x7, 0x7fffffff, 0x9, 0x40, 0x401, 0x7fffffff, 0x100, 0xff, 0x80, 0xfffeffff, 0xabf, 0x4, 0x7, 0x5, 0x9, 0x708f, 0x7, 0x1, 0x99d, 0x9, 0xffffffff, 0x0, 0x0, 0x100, 0x40, 0xad5, 0xc, 0x2, 0x200, 0x5f8, 0x6, 0x8, 0xd7b3, 0xffffffff, 0x80, 0x5, 0x6, 0x3, 0x1, 0x6, 0x6, 0x6, 0x401, 0x2, 0xfffffffa, 0x7, 0x0, 0x7c, 0x5, 0x9, 0x20, 0x7fff, 0x3f, 0x6, 0x1000, 0xc9, 0x87b, 0x5, 0xcbc, 0x20, 0xd20, 0xfc99, 0x7, 0x9, 0x3, 0x101, 0x10001, 0xee, 0x1, 0x6, 0x4, 0x9, 0x1000, 0x9, 0x3, 0x200, 0x5, 0x81, 0x3, 0x43, 0x3, 0x2, 0x7, 0x200, 0x2383, 0xffffffff, 0x2, 0x3, 0x5352, 0x40, 0x1, 0x81, 0x800, 0x3, 0x1, 0xa0, 0x3, 0x0, 0xc9c9, 0x4, 0x6, 0x80000001, 0x7ff, 0x800, 0x8, 0x3, 0x800, 0xc11e, 0x0, 0x2, 0x7f, 0x3, 0x10001, 0x5, 0x8000, 0x8, 0x10001, 0x2, 0xff, 0xaf, 0x532c, 0x9, 0x8, 0x8000, 0x3, 0x8, 0x401, 0xd4, 0x401, 0x5, 0x2, 0x1, 0x3, 0x1, 0xff, 0x7, 0x1, 0x9, 0x0, 0x6, 0x3, 0x0, 0x9, 0x81, 0x22, 0x6, 0x3, 0xac9b, 0x8000, 0x19, 0x8ae, 0x1, 0x5, 0xfe, 0x3f, 0xcb8, 0x6, 0x6, 0x8, 0x7, 0x2, 0x7fff, 0x3, 0x7a99, 0x6, 0x2eb92ca, 0x1f, 0x2, 0x7, 0x0, 0x3, 0xff, 0x6, 0x10001, 0xfffffffe, 0x101, 0x80000001, 0x0, 0x8, 0x7f, 0x73b, 0x3, 0xfffffffa, 0x0, 0xffffffda, 0x9, 0x4, 0x1, 0x44f, 0x80000001, 0x100, 0x8001, 0x8, 0x7cd0, 0xfffffbff, 0x8000, 0x2, 0x0, 0x7, 0x100, 0x70, 0x2, 0x6, 0x9, 0x80000000, 0x800, 0x800, 0x3, 0x0, 0x3, 0x2, 0x0, 0x625d4137, 0x9, 0x5, 0x1c000, 0x10001, 0xffff, 0x6, 0x1, 0x5, 0x8]}, @TCA_POLICE_RATE64={0xc, 0x8, 0x3}]}, @TCA_BASIC_POLICE={0x81c, 0x4, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x8001}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x5, 0x9, 0x80000001, 0x8, 0x5, 0x756d, 0x4, 0x0, 0x8001, 0x4, 0x1, 0x80, 0x3, 0x2, 0x10001, 0x6, 0x2, 0x4, 0x6, 0x1, 0xfffffffa, 0x7fff, 0x7, 0x78, 0x1f, 0x7ff, 0x5, 0x8000, 0x3, 0x3, 0x9, 0xb3ec, 0x6, 0x9, 0x1, 0xfffffff7, 0x7fffffff, 0x9, 0xffffffff, 0x6, 0x800, 0x7, 0xe4c, 0x80, 0x7, 0x6, 0x6, 0x1, 0x7f, 0x40, 0x5, 0x6, 0x2, 0x23a2, 0x8, 0x5, 0x7fffffff, 0x2833, 0x6, 0x7fffffff, 0x10000, 0x4d7efcb4, 0xfc8, 0xfffff0ba, 0x8, 0x400, 0x0, 0xffff, 0xa71d, 0x5, 0x80, 0xfffffe01, 0x80000000, 0x3, 0x6a, 0x1ff, 0x8a2a, 0x7, 0x80000000, 0x401, 0x31a, 0xffffffff, 0x4, 0x9, 0x1f, 0x3b85, 0x8b, 0x80000000, 0x8, 0xdb, 0x5, 0x9, 0xd72a, 0x3, 0x6, 0x3, 0xe016, 0x1, 0x9, 0x81, 0x101, 0x3052, 0x6, 0xe012, 0xf1, 0x8, 0x8b87, 0x53a, 0x6, 0x200, 0x1, 0x5, 0x2, 0x80000000, 0x1, 0x315c, 0x400, 0x812c, 0x2, 0x5, 0x1f, 0x5, 0x20, 0x9, 0x71, 0xff, 0xfffffffe, 0x1ff, 0x4008, 0x80000000, 0x3ff, 0x2, 0x6, 0x1, 0x7, 0x79aa, 0x9, 0x739e29d5, 0x2, 0x8, 0x2, 0x1000, 0xfff, 0x800, 0x6, 0x1, 0x7c, 0x4, 0xfa, 0x80, 0x5, 0x101, 0xd, 0xfffffffd, 0x80, 0x10001, 0x80000000, 0x9, 0x8, 0xa8, 0x1, 0x3, 0x7f, 0x2, 0x4, 0x10001, 0xffff, 0x7fff, 0xfff, 0x2, 0x5, 0x9, 0x3, 0x36, 0x0, 0xfffffffa, 0x4, 0x81, 0x3, 0x6, 0xfffffffe, 0x8000, 0x9, 0x200, 0xbb, 0x3, 0x0, 0x401, 0x9, 0x1, 0x8, 0xff, 0x6, 0xfffffffb, 0x3, 0x494, 0x10000, 0x5, 0xfff, 0xb44, 0x1, 0x1ff, 0x8, 0xd9a, 0x3ff, 0x9, 0x9, 0x20, 0xfffff414, 0x1, 0x3, 0x9, 0xfff, 0x80, 0x1, 0x8, 0xfde5, 0x4, 0x441, 0x1f, 0x700b, 0x9, 0x9f1e, 0x4, 0x800, 0x101, 0x7f, 0xfc, 0x5, 0x0, 0x8, 0x1, 0x2, 0x6, 0x401, 0x5, 0x0, 0xfffffff8, 0xffffff01, 0x32a, 0x8, 0x1e, 0x7fffffff, 0x2, 0x7fff, 0x4, 0x1, 0x3f, 0xfffffffa, 0xfffffff8, 0x800, 0x8, 0x0, 0x3f, 0x81, 0x81]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x6}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x2, 0x4, 0x7, 0x401, 0x2, 0x7, 0x8, 0x3, 0x0, 0x0, 0xe5, 0x4, 0x0, 0x800, 0x5, 0x332, 0x80000000, 0x4, 0x0, 0x1b, 0x1ff, 0x81, 0x81, 0x7fff, 0xffff9a7b, 0xfffffc01, 0x63b, 0x75bb, 0x20, 0x90, 0x1, 0x5, 0x9b5d, 0x6, 0x7ff, 0x7, 0xffffff87, 0x7, 0x5, 0x10000, 0x29, 0x159, 0x80000001, 0x5, 0x100, 0x80000001, 0x1, 0xffffffe0, 0x4, 0x2, 0x4, 0x1, 0xfffffffc, 0x65, 0xba, 0x8, 0x9ac0, 0x1f, 0x8001, 0x8, 0x3ffc0000, 0x40000, 0x6, 0x800, 0x200, 0x3ff, 0x3, 0x2, 0x751f, 0x3, 0x7fffffff, 0x3, 0x1b3, 0x4, 0x3ff, 0x3ff, 0x8, 0x3b5, 0x6, 0x1, 0x5, 0x401, 0x5, 0x1, 0xbb7, 0xf17, 0x3, 0x5, 0x1, 0x3, 0x6, 0x4, 0x1, 0x1, 0x8000, 0x2, 0x8, 0x7fff, 0x1, 0xb42, 0x1, 0xff, 0x6, 0x3, 0x20, 0xf8, 0xa7fe, 0x1, 0xffff, 0x4, 0x5, 0x7fff, 0x4, 0x2, 0x3, 0xa38, 0x0, 0x3, 0x75b7107c, 0x0, 0x2, 0xe6f, 0x2d6, 0x7fff, 0x1, 0x5, 0x20, 0x70c4192d, 0x9, 0x2c, 0x1, 0x401, 0x20, 0x800, 0xfff, 0x5, 0xfffffffa, 0x9, 0x0, 0x90c8, 0x9, 0x6, 0x99e1, 0x3, 0x3b5, 0x9, 0x7fff, 0xc6, 0x4, 0x2, 0x100, 0x80, 0x40, 0xb125, 0x1, 0x6, 0x1000, 0x8000, 0x9, 0xb6, 0x5, 0xff, 0x9a54, 0x0, 0x8001, 0xea, 0x8, 0xf56, 0x8, 0x8000, 0x6, 0x2, 0x7, 0x401, 0x8, 0x51, 0x3, 0xfffffffb, 0x0, 0xfffffffa, 0x5, 0x101, 0x3f, 0x1, 0x9, 0x3, 0xffffffd5, 0xfff, 0x8, 0x9, 0x5d0f, 0x80000000, 0x401, 0x3f, 0x5, 0xb3, 0x1, 0x1, 0x400, 0x7, 0xffffffff, 0x7, 0x48, 0x8, 0xf7, 0x63824e92, 0xa647, 0x3ff, 0x7c, 0xbc, 0xc32a, 0x8000, 0x100, 0xff, 0x5, 0x400, 0x200, 0x101, 0x1, 0x5, 0x2, 0x7ff, 0x3, 0x5, 0x6, 0x1, 0x3f, 0x6d5, 0xffffffff, 0xfff, 0xa996, 0x1ff, 0xd4ca, 0x80, 0xffffffff, 0x8, 0xffffffff, 0x203, 0xffffffff, 0x5c86935e, 0x7, 0x40, 0xfffffff9, 0x81, 0x8, 0x9, 0x7, 0xfff, 0x4ff5, 0x7, 0x7, 0x9, 0x5, 0x6, 0x8, 0x6]}]}, @TCA_BASIC_POLICE={0x40, 0x4, [@TCA_POLICE_TBF={0x3c, 0x1, {0x4, 0x0, 0x9, 0x10001, 0x4, {0x7, 0x1, 0x9, 0x0, 0x400, 0x2}, {0x0, 0x2, 0x81, 0x7ff, 0x4, 0x8}, 0x5, 0x2, 0x4}}]}, @TCA_BASIC_ACT={0x4a8, 0x3, [@m_ctinfo={0xc8, 0x0, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x24, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x8}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x7fff}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x1}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x1}]}, {0x94, 0x6, "3870332752b287fb2d4db0d5c4a0b1de7843eb18893c837116302e99ea79fad8b1a11e07bf8f23f2c38dd6c9174cb0d6c75a95c33b5f15ea499411d5531cce5876308317d16c72e2976593624f6b02c803cb7a97c1cbd841b4b8a63605a08cfcac83f85a7521e775c18e6adc9e44b271d302251e8773903d60b4ffcae224b89ebb6bebc70fc638438654445a61aab232"}}}, @m_ctinfo={0x64, 0x1d, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x44, 0x2, 0x0, 0x1, [@TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x7fff}, @TCA_CTINFO_ZONE={0x6, 0x4, 0x2}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x5}, @TCA_CTINFO_ACT={0x18, 0x3, {0x80000001, 0x2, 0x5, 0x0, 0x2}}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0x5}]}, {0x10, 0x6, "6d841c1f41a471e42506ecc1"}}}, @m_ctinfo={0x54, 0xf, 0x0, 0x0, {{0xb, 0x1, 'ctinfo\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ZONE={0x6, 0x4, 0x8}, @TCA_CTINFO_ZONE={0x6, 0x4, 0x6}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0xa91e}]}, {0x26, 0x6, "6f1e680e79023bedf207c81350efc51fa53256481ed80688d2b3edf53ef7972f7ba2"}}}, @m_simple={0xa0, 0x0, 0x0, 0x0, {{0xb, 0x1, 'simple\x00'}, {0x1c, 0x2, 0x0, 0x1, [@TCA_DEF_PARMS={0x18, 0x2, {0x0, 0x8, 0x4, 0x2}}]}, {0x71, 0x6, "95e2757eb4428351e39a0dade45cc678d5d920b1eecade29e88c6ffae4b1f045003614c334d4937fae739f34470f00b3fcc9566177e9642a4f004783519a5ac314446cbf07ca0697666a57a59c8c5fcbee77e3504bd16db4c4c3659987a46d9057b874d4fb14bf0b2e891c5e72"}}}, @m_gact={0x188, 0x0, 0x0, 0x0, {{0x9, 0x1, 'gact\x00'}, {0xd0, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x1, 0x6, 0x1, 0x0, 0x81}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1e4e, 0x10000000}}, @TCA_GACT_PARMS={0x18, 0x2, {0x101, 0x8, 0x0, 0x0, 0x4}}, @TCA_GACT_PARMS={0x18, 0x2, {0x1, 0x10000, 0x3, 0x1d, 0x3}}, @TCA_GACT_PARMS={0x18, 0x2, {0x10000, 0x8, 0x10000000, 0x9, 0xffffff0d}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0xfde, 0x7}}, @TCA_GACT_PARMS={0x18, 0x2, {0x4ce8, 0x4, 0x10000000, 0x7fffffff, 0x3}}, @TCA_GACT_PARMS={0x18, 0x2, {0xffffffff, 0xff, 0x2, 0x8, 0x3}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x229a, 0x7}}, @TCA_GACT_PARMS={0x18, 0x2, {0x0, 0xcd62, 0x7, 0x8}}]}, {0xa7, 0x6, "c5dfe53b251ce45dccc2d0d296173710048d6745dd200b1196abe13efb1dd35f34feab3060512082c205a316923c2c80058a41a6bb8a2027d7b71d8a9de1cc958e570641109ed4add48b556ba3246b091480bfd33cd6f317650cf2cba8bd8e5b448a113786a894afd4b229984d9c2f1464df85bd89e70ffe940cf658839a382f368d50f1dc8825219367e4bea0091de535b78e887570aca0fd508edcda123f9f98c228"}}}, @m_tunnel_key={0xfc, 0x11, 0x0, 0x0, {{0xf, 0x1, 'tunnel_key\x00'}, {0x9c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0xfffffff8}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x10001, 0xb16d, 0x4, 0x2, 0x6}, 0x2}}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x3}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e24}, @TCA_TUNNEL_KEY_ENC_KEY_ID={0x8, 0x7, 0x8}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @rand_addr=0xfffffffa}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x8, 0x4, 0x10000006, 0x6, 0x7f}, 0x1}}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0xd2f, 0x8, 0x4, 0x80000000, 0x8a20}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @rand_addr="c8af767b3aa05458222800fbe243deb0"}, @TCA_TUNNEL_KEY_ENC_DST_PORT={0x6, 0x9, 0x4e24}]}, {0x49, 0x6, "8092b886b127327f7f4c8aa1619181416d3d6fd38d26e323be5bd023abe199a2cccfff124f170cfd3cfd9cc9fd0b72aaa83baf3d57990d529b7da53d10bc8655b2344d1dc4"}}}]}]}}, @TCA_CHAIN={0x8, 0xb, 0x1}, @TCA_CHAIN={0x8, 0xb, 0x80}]}, 0x1164}, 0x1, 0x0, 0x0, 0x41}, 0x4000000) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_SET_CAPACITY(r5, 0x4c07) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) [ 944.218220][T16848] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 944.242109][T16848] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 09:03:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES64], 0x0, 0x8}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:03:57 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) socket$netlink(0x10, 0x3, 0x0) keyctl$chown(0x4, r0, r2, 0x0) 09:03:57 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$inet(r0, 0x0, 0x20000000) 09:03:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$evdev(r3, &(0x7f0000000100)=[{{0x77359400}, 0x1, 0x7f, 0x401}, {{0x77359400}, 0x12, 0x2, 0x100}, {{r4, r5/1000+10000}, 0x32, 0x8, 0x9d1e}, {{0x77359400}, 0x4, 0x20, 0x6}, {{r6, r7/1000+30000}, 0x1, 0x2, 0x5}], 0x78) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:03:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRESHEX=r2, @ANYBLOB=',mft_zone_multiplier=0']) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x7f, 0x28000) ioctl$FS_IOC_GETFLAGS(r5, 0x80086601, &(0x7f0000000100)) write$FUSE_LK(r4, &(0x7f0000000040)={0x28, 0x0, 0x4, {{0x10000, 0x401, 0x2, r1}}}, 0x28) 09:03:57 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$inet(r0, 0x0, 0x20000000) [ 946.411448][T16872] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:03:58 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$inet(r0, 0x0, 0x20000000) [ 946.551630][T16886] ntfs: (device loop4): parse_options(): Invalid gid option argument: ÅŸÓ\ðI/ÈÖÕ=ü¦Æ3æ?0-d–ÕKäìåAXúÃL®TJä-G¹ÆE„ݦÙÏOboTIÈ”þ”0gÚª‚u 09:03:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="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", @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) [ 946.794302][T16897] ntfs: (device loop4): parse_options(): Unrecognized mount option Kp`ûöì5Ùý'Ó8disable_sparse. [ 946.837838][T16897] ntfs: (device loop4): parse_options(): The gid option requires an argument. 09:03:58 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 09:03:58 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x0) 09:03:58 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) socket$netlink(0x10, 0x3, 0x0) keyctl$chown(0x4, r0, r2, 0x0) [ 947.237411][T16911] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:00 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x12000, 0x4c) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r6}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, r4, 0x10, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0xa5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x10001}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r8, @ANYBLOB=',mft_zone_multiplier=0']) [ 949.299705][T16924] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 949.314683][T16924] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 09:04:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36"], 0x0, 0x3f}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES64], 0x0, 0x8}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:00 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000300)="580000001400192340834b80040d8c560a067fbc45ff81054e220000000058000b480400945f64009400050038925a01000000000000008000f0fffeffe809000000fff5dd0000001000010005080800418e00000004fcff", 0x58}], 0x1) [ 949.375133][T16924] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 949.386745][T16924] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 09:04:01 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB="2c7469706c6b65723d3000000009000000000000000056745c25c0fddcc9616c91e85aa834346a3ba408de2ba8f2f9456b1079a2e966ab08cc9b582827113ecbe9642b9a3f97752b61ddfb767b17ebd0b601082afa7b524bb989731ba6623b8c007fdfdbabf41c438a6da00b875cbfb4ba7196c895f5ba4777cf7f47444e518f6733ccff953c11248c9ee18ec4f85838a6e6496ec93e71e6f06c706fdf00b36b"]) [ 949.444352][T16937] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:01 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000500)='net/softnet_stat\x00') close(r0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0xa, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x111}}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040)=ANY=[], 0x2343a726) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000100)) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000200)=[{}, {}], r2, 0x1, 0x1, 0x400000}}, 0x20) [ 949.588571][T16949] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0xffffffffffffffff 09:04:01 executing program 1: r0 = socket$inet6(0xa, 0x80003, 0x20) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x338, 0xd8, 0xd8, 0xd8, 0xd8, 0xd8, 0x268, 0x268, 0x268, 0x268, 0x268, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a], 0x0, 0xa8, 0xd8}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{}, {0xf5}}}}, {{@uncond, 0x0, 0x168, 0x190, 0x0, {}, [@common=@unspec=@string={{0xc0, 'string\x00'}, {0x0, 0x0, 'bm\x00', "554b98f1d3eeba11cdf903ec78b8a4de747e7320e55d73825c2b1ed3ec1c6c444d7d4cd7730b9ad5bda7c6108bb66c36733254f2aa290ff2f6c7c2c8099913e052775f627fb492aac6276ea2029f63890e2be1f6058b107894befc77067383501e17c5d6705adcd293f6eb066471774ec8548885dcae0646c469a6ae6d7f74a0"}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x398) 09:04:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000040), &(0x7f0000000080)=0x30) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r2, @ANYBLOB="2c6d1b0c7aba6fa029d16e655f6d756c7469706c6965723d30b243c9b11bd084907a571608d73fc21e982aafc2871793b945831d14c2b163237fb3a5b90d9b1bb2ca740c1ff1768a20081505000000000000007c7d7298c830b463ef6e"]) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r3, 0x8983, &(0x7f0000000280)) [ 949.837713][T16967] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 949.841711][T16968] Cannot find add_set index 0 as target [ 949.985205][T16974] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff 09:04:01 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 09:04:01 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000340)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe, 0x5}, 0x8a8a, 0x4de, 0x1f, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$VIDIOC_G_DV_TIMINGS(0xffffffffffffffff, 0xc0845658, &(0x7f0000000380)={0x0, @reserved}) 09:04:01 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r0, r2, 0x0) 09:04:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000480)='wireguard\x00') sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f0000001340)={0x0, 0x0, &(0x7f0000001300)={&(0x7f0000002c40)={0x78, r4, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}, @WGDEVICE_A_PEERS={0x2c, 0x8, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x3}]}]}]}, 0x78}}, 0x0) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x5c, r4, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a='\xa0\\\xa8Ol\x9c\x8e8S\xe2\xfdzp\xae\x0f\xb2\x0f\xa1R`\f\xb0\bE\x17O\b\ao\x8dxC'}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @a='\xa0\\\xa8Ol\x9c\x8e8S\xe2\xfdzp\xae\x0f\xb2\x0f\xa1R`\f\xb0\bE\x17O\b\ao\x8dxC'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4}, 0x10) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SG_GET_COMMAND_Q(r5, 0x2270, &(0x7f0000000080)) [ 950.264428][T16984] ntfs: (device loop4): parse_options(): Invalid gid option argument: 0x00000000ffffffff [ 950.323404][T16989] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 950.342098][T16984] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. [ 950.460051][T16984] netlink: 36 bytes leftover after parsing attributes in process `syz-executor.4'. 09:04:03 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36"], 0x0, 0x3f}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:03 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000040)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYPTR, @ANYRES64]) 09:04:03 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r0, r2, 0x0) 09:04:03 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000000c0)='batadv\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x1c, r0, 0x711, 0x0, 0x0, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 09:04:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES64], 0x0, 0x8}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:04 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 09:04:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r2, 0x29, 0x41, &(0x7f0000000040)={'raw\x00', 0x2, [{}, {}]}, 0x48) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r4 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r4, &(0x7f00000002c0), 0x40000000000009f, 0x0) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYPTR=&(0x7f0000000100)=ANY=[@ANYRESDEC, @ANYRESOCT=r3, @ANYRESOCT=r3, @ANYRESDEC=r3], @ANYBLOB=',mft_zone_multiplier=0']) 09:04:04 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2100, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) pipe(&(0x7f0000000180)) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001540)={0xffffffffffffffff, 0xc0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ftruncate(r1, 0x80006) 09:04:04 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, 0x0, 0x0, 0x0) 09:04:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) r2 = accept(r0, 0x0, &(0x7f0000000040)) setsockopt$inet6_int(r2, 0x29, 0x12, &(0x7f0000000100)=0x7ffffffc, 0x4) 09:04:04 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = dup3(r0, r1, 0x0) dup2(r3, r2) 09:04:04 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) keyctl$chown(0x4, r0, r2, 0x0) 09:04:07 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36"], 0x0, 0x3f}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, 0x0, 0x0, 0x0) 09:04:07 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000740)='./file0\x00', 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, 0x0) r3 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r3, &(0x7f00000004c0)="3161d417452c8f6d46edb3b1077f2abaa85e3489c66107ab7d9aeb42aa515f23c9150bfd105fa1be4e0415cb2c2d4a1cdff5ab24d3676cc093ea0ffa364b7ec5a9", 0x41) sendfile(r3, r3, &(0x7f0000000200), 0xff8) r4 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x5000, 0xffff, 0x0, 0x0, 0xffffffffffffff77}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000180)='Z\x00') memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) 09:04:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRESDEC=0x0], @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:04:07 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) socket(0x10, 0x2, 0x0) setuid(0x0) keyctl$chown(0x4, r0, 0x0, 0x0) 09:04:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff", @ANYRES64], 0x0, 0x23}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 955.595661][T17113] __ntfs_error: 11 callbacks suppressed [ 955.595669][T17113] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 955.618777][T17110] ntfs: (device loop4): parse_options(): Unrecognized mount option €. [ 955.678231][T17126] ntfs: (device loop4): parse_options(): Unrecognized mount option €. 09:04:07 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:07 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) r2 = socket(0x11, 0x800000003, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KDMKTONE(r4, 0x4b30, 0x9) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x40, 0x707, 0x20300000, 0xffff, 0x1}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={r5, 0x800, 0x1}, 0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r6, @ANYBLOB=',mft_zone_multiplier=0']) 09:04:07 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) socket(0x10, 0x2, 0x0) setuid(0x0) keyctl$chown(0x4, r0, 0x0, 0x0) [ 955.954954][T17144] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 955.988389][T17144] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 956.112657][T17149] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 956.122630][T17150] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 956.150429][T17150] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 09:04:07 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101000, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000080)={r3}, 0x14) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={r3, 0x1f, 0xffff}, 0x8) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r5, @ANYBLOB=',mft_zone_multiplier=0']) 09:04:07 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) socket(0x10, 0x2, 0x0) setuid(0x0) keyctl$chown(0x4, r0, 0x0, 0x0) [ 956.377447][T17161] ntfs: (device loop4): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. [ 956.391444][T17161] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 09:04:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000140)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000340)="1fef0d1c4bb168a7cb88468476d25255070979300de09e4f67d44ad6229e4b26371b7e2d1c3394cb818d2848e810dd7bf5d91b03a532781d39b5d41de383c61307360b07f4a0f14b5c23d6f61adbf2bbdfd3ff389921c8ceb11df9724ce36465b7aacf986560f856dcd0998a02530b8e7818f74b1469a782069bb2e97d843fa6fe66e08d0633ef73c3e5a2475d2675f8705a20318533c90714f082e674f29be4df27dc0b8260fdf377ecaaf6d296e7071dce3631daf8e157e8a2b9fb261daec8ae3cfd213d64b9bbc96e4d3db4b8f91af9cce29f0bde0b0353986bb7e5f99536f5a723e58d1ea69b7a2515df4f437e8e5c967f7744ffaf22661f04a8e9ef1ca129394746c39dc16418d89672bda84938ff9ee530ab5dae4d151017fc02eec47164cd9cf65afd008b1d0de0ce7ad2a28f71e580b43305bc532def364d1eab120b1237baa6fe4971c00044ff6d1a3755af57e8489a27852a99c949b4f21201531f6f3f89d2fcfdb0d1e5ad35856b50f90bf81d9f6abc8bedc08caab11bcd65e33abc8ea4a477460e599f54eb1061596b96fc6ceaa7d8fcb7fcb5f358b8d5df99da2c0ed81977f3edd3d927b18c1654dbf42d7b2785595744560bc8c8a2ddf6cc084aa07a5e529478a315b17a89aba9a0d1b862d4bd6ad7592f9e52314c831bc9f9cb4f879dec6654d478634cb10bf8c74296000257b0fd26be2624b239bdedb60edec51a60991484ef8f53f0c455ba969c938ed47de7a7530119dc502f28da212183169ac742ef0c0cddcd0eef2cc911f25736145e3ef77cd5c219cb621e43f35296cbc081bfcb86eb7fda2afc283b6ec3edb3ae8ddf850fe27346c1878b701b749f6404934c8f2df62210ce2ac565565a28e86f97b29a4c17a630845824b7773026764abb9e51566e4eb5f29a2babe1d814d79149d6f064470e7371cf94286c73cd0873de47c947141f8bea7294c79a78ae2b46723a40c19ef1d399fd707bb9939ffc138ce652ae2027a452caf5e884452142ec8fc7f9177f3ec79af80eea4f9f3899f0daf05a4b1c15409a8e73f8143954ec800cd0b56e68c4fb4ac0a4a7dca769730c85b7aef09daad01b84cfa4f5d3dc14f7f5597b6c6c91484e17e2048344d890b011e2a1621c70671904e721f51bed66b5a5a64ef360a44884f3e9c2ff079a7b1ca27ce492f7fbd7f81ba59cd14fe9164305816feeec0b838314eb45dc97fc35fa722aa0ea27ba09b87e2fd4a81b138495b0f0fadd4206390cd01889d6bb28c5dfc995b3256a2486feff2ac746e916a62a7dc15ba4845e840210453db7f310ce7e8f9248b1648c0ee18b06e9d8c45c15a29b647163115ed37efd73e7e709b837fd436feb12a74c2658054d6986b1b03f66d018d4123acad8bf202fd92340d4c5e664d6d552b6d32ad7fc517a814b0b2240c8d7a85600106df9706e0dd341482c05f800bd89479075886014809c092291f966dcfb04fc657272f97a9cac3f7457724989d21e811e0cd2f9c083d53ba7ad4d1ae93bd1006fa2b39c20b11bc06a7403a20cfa226bc3f0fa90ebb00496079cd2cca0a3a2b91cad10b5095babaf140477dc19055f7d3ffb48d9cf82e17026d0b3e1197ea104030a39e15951f52c31ad4cd89ffd06ba0f1429399a2a7b2df13c231ec01188e883f0e91d421e1adcb4d628ea494746245f89812b4cb401a4a7be5c5d15a22a24aa4d956cfc225e772960a9ee2b916885212cfe4362ca4110f227ceb0ddbb02b8d7d17e7dbcc59aad28fbfb05216e4261efbd73ebcb10b13818650ebd553a1d612a44f96b24beee4f547f0187921fbc768cfae08d370886816c8f9e4038c15c7a1a2a73f8dbce133b05361edfb88a1c2ca1b83c68e2fee2cd8260e73943a1515d49b905e1e410220dd497873e753558e6400a31279534eb6fadeb81d3577a63e7660eb19e38c8586e091421897a90414d893732e05afe2f88c30cf9d1588572f0c68e122bdd52c7ba00d6e295827b9b126b1d0f20034e6ce292e753f226935dab03940812fb993115a90ddfa003530984bf7c0c8fba136d03f3f7dca95a373452a7e29e6d70294bfdd9a13087fdffc9e42e63ccc540a43d71fbbe109ae908d36ebf2efd17cc38856ad5d2f163640326273fd6d0a94403afb1545378bc60c6f3a1e5f2ceb9298204c10696f5a105069faa6f0bd00055fc824a65f61a65f9f5301a490af853741f123eb86ad20d2b4a69a9a1732fc0626280c47a6c0636b3cbc5e70561d86c41063fb69269c5bd0f9657258720b5565c665c2e30145f5ee6cb356854397a9f356875339cb2e38191e0c1f45cef6ec51ed4d17a00027afe857f8da7bffc31ad7c063ea3df365583a3760791fd9988d3aeb38d6e674df1ccd1537c0bb41fba2fd21e0fd65795895fed48fe219bfd25f4c3003039b27bda7f44a60c2532cf3215eb66c382076ad4f6aeb9b4744ef0bc6def529971ce8d834a059f03ccef6744251635d16e1e4897b097f0c2e383e8689741476676a6f9f0b275edebaa1828f312c75ee064877c3dc204a7ea522b671e1a6d2a27ac8063f40b432f2b4af70578cc22b374abab0ee546f6617b5247484d5a1eb62f0466871bb0c92e03407a20f0ec86fc0fa8bf757128a5f62cb5a4784ca47df33e581ca1261af82df7826a808cda154bb5b0ae319bf17da341c26335c6b2a8bbe9e2c33bf21c43ee5bdc1ed0e74a94320fd7b01ee23389a2ab2e5ffc6513ac5ed4c104c7709924f5d3504a027a6de3d1c16105ef8c6601293abd15e6464f64bd8ebcc1d969e0d9512f652f4c9c5dbc1b6f3a4dd405551085f3965d64af8c141aee878e003b2c7c21aa7a02601b99bfb60d9948b12206c6a1b16eeafe88487382186356713abd44f49bc6788bfb6331725d0f848699f3067e71aa2625b8ae263561d35b642598f938f99235cad48f44b928014eb1eaf10a0c135aaec3cab8715f24706abba8ce4ecad03b81445f1993a32005d657eb7fb3f05542164bca35ef35ad63fb3831d2ef989812a87332752682b444ee11422b2197d7678e3a80e2d797951aa6c99695e7aebe8bcc5b893bd2bafaa24d96491e67ad97fd4f4d9049ac14f68944b75495fe4e89b08f3868a719ec14672ac9847f2f7b1b5b710059d7d34000f276644d723237928ff690857bb8daf12b6ea55bfac19b458c549d12ba318e956f3cc7d28ad49e2db2938e122c9353bdcebde483dfa383b2a7138b34c94d4c2475e7397ef45942ac668da42d5a6783596ff9dfd12806421637c49d7fbe6461ab108a5f06dd9913a4a37a593ba314e9b7693e305ad451adac4782f137c4e1dd2bf78ed1fbf0910ed902c1f2e9e1ee43ce43b8016c3fbf11ae5323e9dca061f91ac7fec70a606c9f9a6e6b0a5e9193cf9935df39fa3679d9ebc47ac68e9fa04e2e35a7e31c865b4ce2ce6d0607a3954b4340298c0f8df6630006d319b6a7f101bf60296846134c6aed121d403a1746bcbcb6ffb5dffa8b2b032e29dbdce69a5744310851e47cac26fe85dcfeda6e2288f0ae231156cb1673f9f6c4bd422d37a2bcb46661c29ee91d77635c3ce8a6ed4166468d1efa5c2c80cc8daff9a1be8a6714c1952d7da8d577d3fdaa8ef8189b0eae2a6473a0801e94ffc24dd4f49217f53f1b4863c0aa7936a8458460fb3cd9d39bf9e48fb417638caa01082ae54fbd03704569795dd7f6fb28afa89d8bf77bef7773a8b1d7c191437dc401493b5c6306a724b5f2bfb0345ad726df1e4d0d13bf099f4d97ba10dfdd4ac19323b984c6f5a3f59a05d1f46e736b218e4f55d259c84f7ce692d527936ea6909238be7903babbaefcd25a5d57c79e824a3333494a110695b814e7fa03a2ac045de7752a4df41fb8ee3187ce93243eaca15b5103684f9c33424b7c0514838e8cc05ce0b106b8a39777baa63e79d5ffc6524df815e83144094bb07f294b801ac7b1ed8594bae3caaafee2b4f9aab6315cc518a1baaa9fce3f8b1aadac23f0d244fd0466cb589b01248eb2e6d2b8b024f652d250ac6c0920aec0a45e8246bfc3fde3961b2cca6f43d8c0b71a89b5903f3d8f1a5678a37bd22e29ed59005aa8a33c3add67d943a0655fad26a531043da90b682ea4a2dfbd76a004861bc6f34a929cc45eddb16fbfcf94fe547554238481c51acec6ce6d7e5ee126f5d922a11bbaee13c51337b085bfde4ee18266366d7168837b19acbcd2fd73af69121a6f051ac26b27d3954365d8055cc27553999e10180fbb7909f9e72afff1e96701a87ee8b97230fbf151968444165fd2d852f652fb92c70075fd4af8cd2387479da17adbd2e008f5e916a7916d7191c3cc9339933707eb05cb50779aca60dddc3f25aee45a38a1fe3c12efd0d7906f9659d32275ae42d7728854494a2436e57dfd46b1a7e8b49500874e28be870f8243479fbd232039cb3d086d30b6d1f7bb134709821def3731d9e1e0b83d675ba6952e772ea64dca32f502e8f2cac9d34da7c3c604fff7df5dc1bb971fd8bf04c43194fc9c8f16fdc09ab7850bb8b323b26bd9e0cd8589efff1e84d1dec3c85b83cccf1ecaca638b9fbd8f2728f8688f26a314a9b33172b2bed87db363f6b3666f1a4674472cfae0b834e7544c05259d17d25531e45fa43bc84040ff9dddc405c3ddd67414a07608c80254baa1136bd6eb876546f986e5345141032fb9f8f59f7ee49f643ffc260613523ffb1d3d4982598cc76e403ef11f7d1553c0702f89fbe7ac6f63645a85b589a4668bae2213220d75aadd62ae360b22897940f8e0c2dfdd23f7d34578f936adaae9b9933209378fac8ec8b984d40ebe5ff8ec38dab4b3abb4befd3adee307d8ec8481aef7c8810853b91f4a72a35131fd4e9ee916597cba205f74eafa52ca300a2dc4b8cd996362467754bf9973ac18ec6526c8e4796b3e3c216a200b15a44678c1ffa30cedb6b4832778c1060440f278012f8c87a68f3557a75153bf9aa15660b83a2904fb3981350d9106e3f159be6aa4a723e0037a126bf5d9b2a979730297aebe5e7e03badfe67ff12f02b43c1c00b3d97a7f624c5951bed3b8610a614dfefdd52d2ca85eb19854a57f01684ddaa895a5d3229a0bf7ad25657f594dac98870f3aea70217263e955ee4c1dcdb5b17bf5fd10f23873f5e5c7a12f5d41fd0b9887c339c50349277ac472ae1858022b97c1904a01a49bfb5b40c85bf18cc0138ab06f86033a928febda6de19416840514fe7352868838186226db95f9b57bc4ba5297e80d4d3efab766111bd2afe7cab858568340dd1ba6aae63577e0d23eea215a95dd99db347e8645a3870f43467d2858793d0b68934ce3fb551f0fd13736f560f3fa565bf436f91dab514a9ff76212f8d713e808bf6b1632a9211de0b1f475f0b060d704b6e5ec4cc35f3c99799186688c8226da8686ae0449bc928d53f9ab27dbd2e30f88ef6dfb71042a14c839cbb160cce0931778f80d9bd17ae22182c1fde2aaf9bfb1de4ddf09c4239416edd986ad17af75e450395d698ec22596b8053697117bc923fa5b2cc1281591923f0fc840bb2e65822ec6df046fd51e6b556b92dece9483fd27c2ca81064c110ad6664a209f0ffe223fff4f3ec7674aa0296ba0ac9566a996adc33f888acb04d8053dfb4a77aaed2a61f18aab8915095c92b471ec898c786dc83572a0ba4cee919ee20e9370914d87e93d8380816b161b3202aa0771068d71e7050345c8c26002358493490a53d21514956d07a6a314cf0190d7b1a5ac4c6b06e26bf24394caf99e599cb994d94243f206566dcf74e0e0f253860c996fdd") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r2, @ANYBLOB=',mft_zone_multiplier=0']) 09:04:10 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRES64], 0x0, 0x8}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:10 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x4, r0, r1, 0x0) 09:04:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0}, &(0x7f0000cab000)=0xc) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="400000001400010000000000000000000a000000", @ANYRES32=r2, @ANYBLOB="140001000000000000000000000000000000000014000600018000007400000000008ec69e04b42e5a21181e022a7722c478acde3ddb97355632645f1b6c91dc8c1dcf8b016520b3b3f53762e58e05b8aa2eb051169e1be2dc4be670eb15ac3f1de3914bf75240cc73d9e6b730564768b7086acbef7bb59fad7929ede8a002a9e760501d6129cbbd5f8ca24641a61498d9023657a9e5b8f924347e53fcb66311d2d1d1dab452daa891ab066e7c86ffb3bef62d4625ba0ebdc7891c358ee4b5e41db9d65df8641d7bdb584abeaeb9a0859f751049faa86e8c32cd20d5477fc9fec512c2ce4076ad8ae287739de0ac20"], 0x40}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000280)={0x200, 0x2, 0x4, 0x0, 0x80000001, {0x77359400}, {0x5, 0x4, 0xff, 0x8, 0x4, 0x8, "49844cf9"}, 0x7, 0x1, @fd, 0x69cb, 0x0, r4}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r6, r6) ioctl$sock_kcm_SIOCKCMUNATTACH(r5, 0x89e1, &(0x7f0000000300)={r6}) r7 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0x11, 0x800000003, 0x0) bind(r8, &(0x7f0000000080)=@generic={0x25, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2204e2, &(0x7f00000001c0)=ANY=[@ANYBLOB="666d61736b3d30303030303030303030303030303004003030303030302c64697361626c655f7370617273653d6e6f2c636173655f73656e7369746976653d6e6f2c6769643d", @ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES32=r7, @ANYBLOB="6a405522df382a4aafc3b67523335a7c41465dc8614eb9238f054e16a5ae2abb65e00318b12d5189e7dfda82d2c4710e8e5261dfee712adcde405de0e595f986d9f5338d217e697445f34fd7aae1f380d2ba20f961b33b7a776609f6c06c13505485ac1900a29141adc138db5a20ed0ff239a90f73c946a21b58fb366168ff84acf1560dae19c4d26597ee587e8b51303c315813cce7d89ef24ac2673861a9e3c0291d422ff4385d0f75e834d92750d381a6676ef7c8b1fb6881c9d1418f0fa2b613", @ANYRESDEC=r1, @ANYRESOCT], @ANYBLOB=',mft_zone_multiplier=0', @ANYRES16]) timer_create(0x1, &(0x7f0000000140)={0x0, 0x31, 0x1}, &(0x7f0000000240)) 09:04:10 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a368d878992349c977647", @ANYRES64], 0x0, 0xd}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, 0x0, 0x0, 0x0) 09:04:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff", @ANYRES64], 0x0, 0x23}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:10 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x7) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r1, @ANYBLOB=',mft_zone_multiplier=0']) 09:04:10 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = getuid() ioprio_get$uid(0x3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000040)={0x3}) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRESHEX=r4, @ANYBLOB=',mft_zone_multiplier=0']) 09:04:10 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x4, r0, r1, 0x0) 09:04:11 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x4, r0, r1, 0x0) 09:04:11 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:12 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 960.658106][T17278] __ntfs_error: 16 callbacks suppressed [ 960.658114][T17278] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:13 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRES64], 0x0, 0x8}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:13 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000040)={0x9, &(0x7f0000000100)=[{@none}, {@fixed}, {@fixed}, {@none}, {}, {}, {}, {}, {}]}) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x208000, &(0x7f00000003c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive=no,gid=', @ANYRES32=0x0, @ANYRESOCT=r4]) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) read$snddsp(0xffffffffffffffff, &(0x7f00000004c0)=""/240, 0xf0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = fcntl$dupfd(r7, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f00000005c0)={0x7, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(0xffffffffffffffff, 0xc00464c9, &(0x7f0000000600)={r9}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r6, 0xc00464c9, &(0x7f0000000080)={r9}) 09:04:13 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff", @ANYRES64], 0x0, 0x23}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xffbffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 961.877416][T17300] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 961.879439][T17297] ntfs: (device loop4): parse_options(): The gid option requires an argument. 09:04:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xffbffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 09:04:13 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xffbffffffffff57a, 0x1, &(0x7f0000000140)=[{&(0x7f0000000300)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) [ 962.123377][T17319] ntfs: (device loop4): parse_options(): The gid option requires an argument. [ 962.134528][T17332] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:13 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba72cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7403200800000000000000101013c5811039e1577ecce66fd792bbf0e5bf7ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e4ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=@ipv6_newaddr={0x40, 0x14, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_ADDRESS={0x14, 0x1, @empty}, @IFA_CACHEINFO={0x14, 0x6, {0x8001, 0x74}}]}, 0x40}}, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYRES16=r2, @ANYBLOB="c0df674e883b55af9a26a8d814a7444e9591e83d27f79b2cad24e044fd057417e72fafd3479bd1307ad29e51d06a3ed7691f09072da725124d2c00a95345b877af5b0575350595b7d71d31ef2b0b788b1a6827e6f029e5ee77c65288d693158dc5bef3b7785658d965efd52eec23", @ANYPTR]) 09:04:13 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) keyctl$dh_compute(0x17, &(0x7f0000000080), &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x4, 0x0, r1, 0x0) 09:04:13 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) [ 962.378611][T17350] ntfs: (device loop4): parse_options(): Unrecognized mount option . [ 962.477610][T17355] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 962.483589][T17357] ntfs: (device loop4): parse_options(): Unrecognized mount option . 09:04:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRES64], 0x0, 0x8}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:16 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:16 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self\x00', 0x0, 0x0) dup2(r0, r1) ioctl$PIO_FONTRESET(r1, 0x541b, 0x717000) 09:04:16 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) keyctl$dh_compute(0x17, &(0x7f0000000080), &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x4, 0x0, r1, 0x0) 09:04:16 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd", @ANYRES64], 0x0, 0x31}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:16 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:16 executing program 4: r0 = semget$private(0x0, 0x8, 0x0) semop(r0, &(0x7f0000000500)=[{0x0, 0x1009, 0x1000}], 0x1) semctl$IPC_RMID(r0, 0x0, 0x0) [ 964.948523][T17389] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:16 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) keyctl$dh_compute(0x17, &(0x7f0000000080), &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x4, 0x0, r1, 0x0) 09:04:16 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:16 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f00000002c0)={0x2, 0x0, @remote}, 0x10) sendmsg$rds(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x3f}, 0x10, 0x0}, 0x0) 09:04:16 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0xc0502100, 0x0) [ 965.200863][T17409] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES64], 0x0, 0x8}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:19 executing program 3: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:19 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0xc0502100, 0x0) 09:04:19 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:19 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="240b6757c1bd10b6260e203b1059b85b65f509f8c0fbc5a663899f45bf80aaf6d3652fa1f5e4259ed3edc32ecdb505a9ec040d3c01a68d3c20360820f8df0000c5c8ca2c954ed573acde0483872ab8df37b4957449ce3aab4356b379ce3023347919aa2721d2eac7082ab0bd3a84f32687806c36a0c00cce1e1f53f6bc698b99cee00a9979046770ae0e4029039bce7acb66"], 0xda00) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETFILTEREBPF(r1, 0x6609, 0x0) 09:04:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd", @ANYRES64], 0x0, 0x31}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:19 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0xc0502100, 0x0) 09:04:19 executing program 3: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:19 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x4b47, 0x0) 09:04:19 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:19 executing program 3: r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:19 executing program 4: r0 = bpf$MAP_CREATE(0x1000000000000, &(0x7f00000000c0)={0x2, 0x800000000000004, 0x4, 0x1}, 0x40) bpf$MAP_LOOKUP_ELEM(0x4, &(0x7f0000000000)={r0, &(0x7f0000000100), 0x0}, 0x20) 09:04:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES64], 0x0, 0x8}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:22 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:22 executing program 3: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:22 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:22 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd", @ANYRES64], 0x0, 0x31}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:22 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:22 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:22 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:22 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:22 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:22 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES64], 0x0, 0x8}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:25 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:25 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:25 executing program 3: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:25 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e0", @ANYRES64], 0x0, 0x38}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:25 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:25 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:25 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:25 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:26 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:26 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x0, &(0x7f0000000080)}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:28 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28", @ANYRES64], 0x0, 0x28}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:28 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x0, &(0x7f0000000080)}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:28 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:28 executing program 3: syz_mount_image$ntfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:28 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e0", @ANYRES64], 0x0, 0x38}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:28 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x0, &(0x7f0000000080)}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:28 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:28 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28", @ANYRES64], 0x0, 0x28}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:28 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:28 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7ffffffb}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:28 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:29 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7ffffffb}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:29 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x7ffffffb}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:29 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) [ 977.674825][ T27] audit: type=1326 audit(1585213469.208:9): auid=0 uid=0 gid=0 ses=4 subj=_ pid=17640 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f68a code=0x0 09:04:29 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', 0x0, 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:29 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e0", @ANYRES64], 0x0, 0x38}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:31 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', 0x0, 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:31 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:31 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28", @ANYRES64], 0x0, 0x28}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:31 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) 09:04:31 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:31 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', 0x0, 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 980.399299][ T27] audit: type=1326 audit(1585213471.928:10): auid=0 uid=0 gid=0 ses=4 subj=_ pid=17686 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f68a code=0x0 09:04:32 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 980.507926][T17703] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:32 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 980.757983][T17709] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:32 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:32 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 981.106254][T17721] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:32 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0xc0502100, 0x0) [ 981.272221][ T27] audit: type=1326 audit(1585213472.798:11): auid=0 uid=0 gid=0 ses=4 subj=_ pid=17730 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45f68a code=0x0 09:04:34 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442ae", @ANYRES64], 0x0, 0x3b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:34 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:34 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 983.180856][T17748] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:34 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e0", @ANYRES64], 0x0, 0x38}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:34 executing program 4: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4004550c, 0x0) 09:04:34 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0xc0502100, 0x0) 09:04:35 executing program 4: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4004550c, 0x0) 09:04:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0xc0502100, 0x0) 09:04:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:35 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0xc0502100, 0x0) 09:04:35 executing program 4: ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r0, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4004550c, 0x0) 09:04:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32, @ANYBLOB="000000000000000018", @ANYRES32, @ANYBLOB="000000c4"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000040)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="240800002a00290400"/20, @ANYRES32=r3], 0x2}}, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffdc, 0x0) [ 983.628491][T17775] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 983.800750][T17789] netlink: 2048 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:37 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:37 executing program 4: r0 = syz_open_dev$usbfs(0x0, 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:37 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442ae", @ANYRES64], 0x0, 0x3b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 986.194690][T17803] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:38 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:38 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e0", @ANYRES64], 0x0, 0x38}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:38 executing program 5: futex(&(0x7f000000cffc)=0x100000000000004, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x3, 0x1, 0x0, &(0x7f0000000040), 0x0) 09:04:38 executing program 4: r0 = syz_open_dev$usbfs(0x0, 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:38 executing program 4: r0 = syz_open_dev$usbfs(0x0, 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:38 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:38 executing program 5: futex(&(0x7f000000cffc)=0x100000000000004, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x3, 0x1, 0x0, &(0x7f0000000040), 0x0) 09:04:38 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:38 executing program 5: 09:04:38 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) [ 986.748941][T17839] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:38 executing program 5: 09:04:40 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442ae", @ANYRES64], 0x0, 0x3b}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:40 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:41 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e0", @ANYRES64], 0x0, 0x38}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:41 executing program 5: 09:04:41 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:41 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:41 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:41 executing program 5: 09:04:41 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) [ 989.633159][T17882] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:41 executing program 5: 09:04:41 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:41 executing program 5: 09:04:43 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc", @ANYRES64], 0x0, 0x3d}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:43 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x64}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000ee000003ed94c700030006000000000002000004000000bb000000000000000603000500000000000200423b000001000012b478407f8604"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="0209000902e67a910d00000000663260"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000003, 0x0) 09:04:44 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489", @ANYRES64], 0x0, 0x40}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:44 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:44 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:44 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:44 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x64}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000ee000003ed94c700030006000000000002000004000000bb000000000000000603000500000000000200423b000001000012b478407f8604"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="0209000902e67a910d00000000663260"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000003, 0x0) 09:04:44 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x64}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000ee000003ed94c700030006000000000002000004000000bb000000000000000603000500000000000200423b000001000012b478407f8604"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="0209000902e67a910d00000000663260"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000003, 0x0) [ 992.681800][T17929] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:44 executing program 5: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x64}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000184000)=ANY=[@ANYBLOB="020100021000000000000600000000000800120000ffff00000000000000000006000000000000000000800000000000e00000010000000000000000000035000000000000000000ee000003ed94c700030006000000000002000004000000bb000000000000000603000500000000000200423b000001000012b478407f8604"], 0x80}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="0209000902e67a910d00000000663260"], 0x10}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x400000000000003, 0x0) 09:04:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 993.055916][T17952] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:44 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:04:44 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB]) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 993.100998][T17959] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 993.182291][T17962] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 993.205677][T17964] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:46 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc", @ANYRES64], 0x0, 0x3d}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 995.296893][T17989] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:47 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489", @ANYRES64], 0x0, 0x40}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:47 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:47 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB]) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:47 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 995.689800][T18008] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 995.736430][T18011] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 995.841162][T18024] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 995.928452][T18032] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 995.994354][T18038] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:47 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 996.066261][T18045] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 996.172853][T18047] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:49 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc", @ANYRES64], 0x0, 0x3d}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:49 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 998.278719][T18059] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:50 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489", @ANYRES64], 0x0, 0x40}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:50 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB]) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:50 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:50 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 998.738673][T18073] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 998.780379][T18072] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 998.971363][T18100] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:50 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,d']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 999.148695][T18103] ntfs: (device loop3): parse_options(): Unrecognized mount option d. 09:04:50 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 999.393402][T18119] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:50 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,d']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:51 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) [ 999.490388][T18121] ntfs: (device loop3): parse_options(): Unrecognized mount option d. 09:04:52 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:52 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:53 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,d']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:53 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804", @ANYRES64], 0x0, 0x44}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:04:53 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1001.788149][T18157] ntfs: (device loop3): parse_options(): Unrecognized mount option d. [ 1001.800578][T18156] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:04:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:53 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1001.977837][T18181] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:53 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:53 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) [ 1002.132113][T18192] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:53 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1002.359653][T18210] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:04:56 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804", @ANYRES64], 0x0, 0x44}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:56 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:04:56 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:56 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:56 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) [ 1004.858353][T18231] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1004.951800][T18251] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:56 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1005.265555][T18259] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1005.385240][T18273] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:57 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_se']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:57 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) [ 1005.593740][T18275] ntfs: (device loop3): parse_options(): Unrecognized mount option case_se. 09:04:57 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1005.893461][T18300] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:59 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804", @ANYRES64], 0x0, 0x44}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:59 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_se']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:04:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:04:59 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:04:59 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:04:59 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:04:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1007.913175][T18321] ntfs: (device loop3): parse_options(): Unrecognized mount option case_se. [ 1007.951861][T18327] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1008.009986][T18336] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1008.080227][T18340] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1008.183575][T18344] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1008.345555][T18352] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:04:59 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:00 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_se']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1008.489227][T18359] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1008.533936][T18365] ntfs: (device loop3): parse_options(): Unrecognized mount option case_se. 09:05:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a", @ANYRES64], 0x0, 0x46}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:02 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:05:02 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:05:02 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensit']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:02 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1011.016890][T18393] ntfs: (device loop3): parse_options(): Unrecognized mount option case_sensit. 09:05:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:02 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:02 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensit']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1011.478434][T18434] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1011.512988][T18435] ntfs: (device loop3): parse_options(): Unrecognized mount option case_sensit. 09:05:03 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensit']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1011.823919][T18444] ntfs: (device loop3): parse_options(): Unrecognized mount option case_sensit. [ 1011.964375][T18456] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:05 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a", @ANYRES64], 0x0, 0x46}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:05 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:05:05 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitiv']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:05 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:05:05 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:05 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:05 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) [ 1014.081309][T18482] ntfs: (device loop3): parse_options(): Unrecognized mount option case_sensitiv. [ 1014.211851][T18506] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:05 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:05:05 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:05:06 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:05:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:06 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) [ 1014.766325][T18530] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:08 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a", @ANYRES64], 0x0, 0x46}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:08 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:05:08 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitiv']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:08 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:08 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:05:08 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1017.134694][T18550] ntfs: (device loop3): parse_options(): Unrecognized mount option case_sensitiv. 09:05:08 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) [ 1017.202118][T18569] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:08 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(r0, 0x4004550c, 0x0) 09:05:09 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4004550c, 0x0) 09:05:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:09 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4004550c, 0x0) 09:05:09 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitiv']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1017.706588][T18596] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1017.769381][T18598] ntfs: (device loop3): parse_options(): Unrecognized mount option case_sensitiv. 09:05:11 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x908, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000080)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000000), 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='io.stat\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10012, r1, 0x0) ioctl$USBDEVFS_REAPURBNDELAY(0xffffffffffffffff, 0x4004550c, 0x0) 09:05:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:11 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10007, 0x0) 09:05:11 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:11 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:11 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000640)=@mangle={'mangle\x00', 0x64, 0x6, 0x5b8, 0x0, 0x230, 0x230, 0x418, 0x418, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x4e8, 0x6, 0x0, {[{{@ipv6={@mcast2, @mcast1, [], [], 'syzkaller1\x00', 'netdevsim0\x00'}, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@multicast2, @ipv4=@remote, 0x40}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0x100, 0x140, 0x0, {}, [@common=@srh={{0x30, 'srh\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@mcast1, @ipv6=@ipv4={[], [], @broadcast}}}}, {{@ipv6={@mcast2, @local, [], [], 'team0\x00', 'veth0_to_batadv\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x618) 09:05:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1020.172714][T18620] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1020.190616][T18624] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:11 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:11 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$netlink(0x10, 0x3, 0x12) dup2(r0, r1) 09:05:11 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1020.380076][T18650] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:12 executing program 4: r0 = syz_open_dev$usbfs(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x28081) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f0000000080)={0x1, 0x0, 0x0, 0x0, 0xfeae, 0x0, 0x0}) [ 1020.498897][T18664] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1020.554462][T18670] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1020.568023][T18676] usb usb7: usbfs: process 18676 (syz-executor.4) did not claim interface 0 before use 09:05:12 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10007, 0x0) 09:05:12 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(0x0, &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1021.277639][T18688] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:14 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:14 executing program 4: r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000100)="1c65319a5a033dcfff4ecbbb02ac0581079b56b2e9d03395140bde1b718bc6aa", 0x20}], 0x1, &(0x7f0000000080)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac141426ac14140000000000380000000000000000000000070000004c0400000094040000440c0003ffffffff00000000831300ac141400ac1414a18c69eb0000000000"], 0x58}, 0x0) 09:05:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:14 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:14 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x10007, 0x0) 09:05:14 executing program 4: 09:05:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1023.210952][T18716] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1023.276239][T18734] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:14 executing program 4: 09:05:14 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1023.454772][T18748] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1023.497433][T18751] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:17 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:17 executing program 4: 09:05:17 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, 0x0, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:17 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10007, 0x0) 09:05:17 executing program 4: [ 1026.246663][T18776] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1026.318141][T18775] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:17 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:17 executing program 4: 09:05:17 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:17 executing program 4: 09:05:18 executing program 4: perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r0, &(0x7f0000000000)=""/62, 0xd6147cbb6f273a13) semget$private(0x0, 0x0, 0x0) [ 1026.495480][T18804] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:18 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1026.711123][T18816] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:20 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000004400)=[{{0x0, 0xe000100, &(0x7f00000016c0)=[{&(0x7f0000000600)="cb", 0x1}], 0x1}}], 0x1cb, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 09:05:20 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:20 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:20 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10007, 0x0) [ 1029.259830][T18832] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:20 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1029.403132][T18853] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:21 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1029.515490][T18855] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:21 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1029.716147][T18869] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1029.835196][T18872] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:21 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:21 executing program 4: pipe(0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xf7ffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo\x00') getdents(r0, &(0x7f0000000000)=""/62, 0xd6147cbb6f273a13) semget$private(0x0, 0x0, 0x0) [ 1030.114373][T18879] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:21 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1030.282174][T18893] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:23 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:23 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x4, @dev={[], 0xa}, 'lo\x00'}}, 0x1e) sendmmsg(r0, &(0x7f0000004400)=[{{0x0, 0xe000100, &(0x7f00000016c0)=[{&(0x7f0000000600)="cb", 0x1}], 0x1}}], 0x1cb, 0x0) syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x0) pipe(&(0x7f0000000040)) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 09:05:23 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:23 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10007, 0x0) [ 1032.297645][T18905] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:23 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={0x0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1032.428185][T18911] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1032.440519][T18925] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:24 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:24 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, 0x0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1032.653828][T18933] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:24 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, 0x0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1032.882850][T18954] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1032.898510][T18956] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:24 executing program 1: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10007, 0x0) 09:05:24 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, 0x0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1033.206127][T18969] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:26 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x16a, 0x8001}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x200000c, 0x1010, r0, 0x1000) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) sched_setscheduler(0x0, 0x5, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r1, 0x400000001ffffffd) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000040)=@buf={0xd7c, &(0x7f0000001180)="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"}) socket$netlink(0x10, 0x3, 0x12) 09:05:26 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:26 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:26 executing program 1: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10007, 0x0) [ 1035.420515][T18992] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1035.484735][T19005] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:27 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:27 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1035.694494][T19014] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:27 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:27 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x16a, 0x8001}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x200000c, 0x1010, r0, 0x1000) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) sched_setscheduler(0x0, 0x5, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r1, 0x400000001ffffffd) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000040)=@buf={0xd7c, &(0x7f0000001180)="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"}) socket$netlink(0x10, 0x3, 0x12) [ 1035.970960][T19027] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1036.076302][T19037] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:27 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1036.324579][T19045] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x16a, 0x8001}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x200000c, 0x1010, r0, 0x1000) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) sched_setscheduler(0x0, 0x5, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r1, 0x400000001ffffffd) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000040)=@buf={0xd7c, &(0x7f0000001180)="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"}) socket$netlink(0x10, 0x3, 0x12) 09:05:29 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:29 executing program 1: pipe(0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(0xffffffffffffffff, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10007, 0x0) 09:05:29 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:29 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x16a, 0x8001}, 0x0, 0x0, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$admmidi(0x0, 0x0, 0x0) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x200000c, 0x1010, r0, 0x1000) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) sched_setscheduler(0x0, 0x5, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x404e20}, 0x1c) listen(r1, 0x400000001ffffffd) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = accept4(r1, 0x0, 0x0, 0x0) sendmmsg(r3, &(0x7f0000003d40)=[{{0x0, 0xffffffbf, 0x0, 0x0, 0x0, 0x0, 0x7000000}}], 0x4000000000000d0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000040)=@buf={0xd7c, &(0x7f0000001180)="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"}) socket$netlink(0x10, 0x3, 0x12) [ 1038.522814][T19073] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1038.596564][T19089] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:30 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:30 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') fchdir(r0) getcwd(0x0, 0x3) 09:05:30 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:30 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r1, &(0x7f0000001780)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)=""/187, 0xbb}, {&(0x7f0000000200)=""/183, 0xb7}, {&(0x7f00000002c0)=""/193, 0xc1}, {&(0x7f00000003c0)=""/37, 0x25}, {&(0x7f0000000400)=""/11, 0xb}, {&(0x7f0000001440)=""/197, 0xc5}, {&(0x7f0000001540)=""/40, 0x28}], 0x7}}], 0x2, 0x0, 0x0) 09:05:30 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1039.350201][T19108] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:30 executing program 4: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x6, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x40) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x6, 0x7, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000851000000300000018100000", @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0xe, 0x0, &(0x7f00000005c0)="866a98bfd126d90741a041e81553", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1039.459147][T19130] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:31 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:05:32 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:32 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="6c0000002400f193186526b3f87b3d81ba347477", @ANYRES32, @ANYBLOB="00001000ffffffff000000000a0001006e6574656d0000003c0002000000000000000000000000000000000000000000000000000c000b00000000000052e0db1400010005000000000000000000000000000000a1d04ff131f4858458ba0492c8b4f08fe7f3b1d6cf071419d9a4117c1b56df878163d7c9dd693feb8150abbb3f00000000000000000000eb2058d096ee49dffb7715c858c243d01bda9296c929095eac83a479d1a7e5be07413b700243ab1cafada043d3134cdf53a3c237ea5ea95aee077fd793ff88d6d360dcf043f9e97035c647e9db2be93009000000000000"], 0x6c}}, 0x0) r1 = socket(0x1000000010, 0x80002, 0x0) sendmmsg$alg(r1, &(0x7f0000000200), 0x10efe10675dec16, 0x0) 09:05:32 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:32 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:32 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) [ 1041.557302][T19163] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1041.643717][T19177] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:33 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:33 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:33 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002440)=[{{0x0, 0x2a0, &(0x7f0000000180)=[{&(0x7f00000005c0)=""/4096, 0x13}], 0x1, 0x0, 0x0, 0xa00100}}], 0x4000000000001ba, 0x6, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="2400000026000102c907359d00008f01010000da6e5f3f00b17f20a741d732673f92b8824daf6c7442ca9b84a90121a500306377e87b94e2ca68026b89dc1764fc8737861d779c9d7e55cb6020aea5360726b544370e585253bcb877cb5a9150d5f6a7156ee957db1d8755ba42c46323340b3d164213e38038d9161394f6ed90b704d71a", @ANYRES32=0x0, @ANYBLOB="0000108e0dffffff5cdc4308009b936c854bf55e61e50aeb152b55e757cb75c52e3a284e2774db72dc204ae84f635fc605ca2f874b0b8824d65067662a3d138a90cfe2d089c55fd7be933bc7844a65"], 0x24}}, 0x0) 09:05:33 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:33 executing program 4: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000003700)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[@op={0x18}, @op={0x18}], 0x30}], 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e24, @local}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0xfffffffffffffd95, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x18}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000800)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa2}}], 0x400000000000953, 0x0, 0x0) [ 1041.933610][T19187] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:33 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1042.095211][T19207] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:33 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x13}]}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}]}, 0x58}, 0x1, 0x60}, 0x0) [ 1042.141894][T19210] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:36 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={0x0}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe80, 0x0, &(0x7f00000000c0)="b9ff03c6630d698cb89e0bf088ca1fffffff0e000000630677fbac14140ce0", 0x0, 0x2f, 0x0, 0x0, 0xfffffffffffffe2a}, 0x28) 09:05:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:36 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(0xffffffffffffffff) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) [ 1044.552526][T19228] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1044.665098][T19248] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:36 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:36 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0x0, &(0x7f00000001c0)={0x0, ""/250}, 0x102, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000258f88)) msgsnd(0x0, &(0x7f0000000340)={0x3}, 0x0, 0x0) 09:05:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={0x0}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:36 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:36 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000080)='pkcs7_test\x00', 0x0, 0x0, 0x0, r0) 09:05:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={0x0}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1044.971985][T19262] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:36 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000080)=""/44, 0xf8dce77545f3ac9f, 0x0) r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) r1 = dup(r0) execveat(r1, &(0x7f00000000c0)='\x00', &(0x7f00000002c0), 0x0, 0x1000) [ 1045.106385][T19277] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1045.135325][T19284] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:39 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:39 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:39 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:05:39 executing program 4: clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x3c1, 0x3, 0x2b8, 0x0, 0x120, 0x120, 0x120, 0x0, 0x1e8, 0x1e8, 0x1e8, 0x1e8, 0x1e8, 0x3, 0x0, {[{{@ipv6={@remote, @dev, [], [], 'ip6gretap0\x00', 'vxcan1\x00'}, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@frag={{0x30, 'frag\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@loopback, 'veth0_to_team\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0xc}}}}, 0x53c) getsockname$inet6(0xffffffffffffffff, 0x0, 0x0) userfaultfd(0x0) [ 1047.612030][T19302] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1047.636221][T19309] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 1047.659443][T19307] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:39 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r1, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000580)={0x0, @bt={0x81, 0xfffffffb, 0x0, 0x1, 0xc68a, 0x4, 0x7ff, 0x400, 0x2, 0x3, 0x8, 0x1, 0xdbf, 0x2, 0x1, 0x5, {0x8, 0x7}, 0x6, 0xf8}}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x34, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @vcan={{0x30, 0x1, 'vcan\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="3c00000001040144ba0000000100000002000004060006400004000006000640000500000600064000060000080005400007000047570d01000000401bef3ec7f9f0a38712bed5c5959ed9efd11da40c609b6fa397aa80be0965d169320a1ef2f067705f0a870769808d11c531e74faea80f34ad737b626a17cab267df78"], 0x3c}, 0x1, 0x0, 0x0, 0x2}, 0x20040001) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x408100, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @bond={{0x9, 0x1, 'bond\x00'}, {0x10, 0x2, 0x0, 0x1, [@IFLA_BOND_ARP_IP_TARGET={0x4}, @IFLA_BOND_ARP_INTERVAL={0x8, 0x7, 0x2}]}}}]}, 0x40}}, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') 09:05:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1047.941129][T19326] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:39 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1048.030811][T19328] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1048.065613][T19328] (unnamed net_device) (uninitialized): Removing last arp target with arp_interval on [ 1048.091796][T19336] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1048.139335][T19364] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:39 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1048.184040][T19377] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1048.196729][T19328] (unnamed net_device) (uninitialized): Removing last arp target with arp_interval on [ 1048.327526][T19386] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:39 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:05:42 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:42 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000000)={@empty, @remote, @val={@val={0x8100}, {0x8864}}, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "3c0a7d06baf4691d44f546cbec4cebdba7dfc50f9d12bf3008bc2850db5463d4bb57709161a3cba2b39d984ddaf16cc1947433a95e691459b7de8dcd6063bbc0"}}}}, 0x0) 09:05:42 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:42 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) [ 1050.718704][T19407] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1050.741166][T19408] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:42 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:42 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000000)={@empty, @remote, @val={@val={0x8100}, {0x8864}}, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "3c0a7d06baf4691d44f546cbec4cebdba7dfc50f9d12bf3008bc2850db5463d4bb57709161a3cba2b39d984ddaf16cc1947433a95e691459b7de8dcd6063bbc0"}}}}, 0x0) 09:05:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, 0x0, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1051.047430][T19428] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:42 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000000)={@empty, @remote, @val={@val={0x8100}, {0x8864}}, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "3c0a7d06baf4691d44f546cbec4cebdba7dfc50f9d12bf3008bc2850db5463d4bb57709161a3cba2b39d984ddaf16cc1947433a95e691459b7de8dcd6063bbc0"}}}}, 0x0) [ 1051.149260][T19435] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:42 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:42 executing program 4: syz_emit_ethernet(0x5e, &(0x7f0000000000)={@empty, @remote, @val={@val={0x8100}, {0x8864}}, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "3c0a7d06baf4691d44f546cbec4cebdba7dfc50f9d12bf3008bc2850db5463d4bb57709161a3cba2b39d984ddaf16cc1947433a95e691459b7de8dcd6063bbc0"}}}}, 0x0) [ 1051.282589][T19440] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:45 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:45 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:45 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 09:05:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:45 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) [ 1053.761661][T19456] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1053.792409][T19462] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:45 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:45 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 09:05:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:45 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:45 executing program 4: syz_emit_ethernet(0x0, 0x0, 0x0) 09:05:45 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1054.119503][T19476] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1054.146499][T19477] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:45 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x1) socket$inet6(0xa, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='pagemap\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=@newlink={0x3c, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r6}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}]}]}, 0x3c}}, 0x0) [ 1054.300260][T19489] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1054.328522][T19491] x_tables: duplicate underflow at hook 2 [ 1054.350371][T19491] x_tables: duplicate underflow at hook 2 09:05:48 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:48 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) msgrcv(0x0, &(0x7f00000001c0)={0x0, ""/250}, 0x102, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000340)={0x3}, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) 09:05:48 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:48 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) [ 1056.769756][T19509] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1056.800037][T19507] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:48 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:48 executing program 4: mq_open(0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x105082) mmap(&(0x7f0000009000/0xf000)=nil, 0xf000, 0x380010a, 0x100812, r0, 0x0) mlock2(&(0x7f0000014000/0x2000)=nil, 0x2000, 0x0) 09:05:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0], 0x4}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) dup2(r0, r1) 09:05:48 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x4, r0, r1, 0x0) 09:05:48 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0], 0x4}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1057.160997][T19533] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setpriority(0x2, 0x0, 0x100) [ 1057.242698][T19543] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1057.254590][T19546] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x2, 0x3, 0x4b0, 0x0, 0x0, 0x0, 0x2f0, 0x0, 0x418, 0x418, 0x418, 0x418, 0x418, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], 0x180000, 0x2d0, 0x2f0, 0x0, {}, [@common=@unspec=@cluster={{0x30, 'cluster\x00'}}, @common=@unspec=@bpf0={{0x230, 'bpf\x00'}}]}, @unspec=@TRACE={0x20, 'TRACE\x00'}}, {{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@unspec=@connlabel={{0x28, 'connlabel\x00'}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x510) 09:05:51 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:51 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x4, r0, r1, 0x0) 09:05:51 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:05:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0], 0x4}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1059.819821][T19567] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1059.836069][T19569] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1059.959004][T19585] xt_bpf: check failed: parse error 09:05:51 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x17, 0x0, 0x40001, 0x1, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, 0x0, &(0x7f0000000240)}, 0x20) 09:05:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1060.184781][T19593] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:51 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) keyctl$chown(0x4, r0, r1, 0x0) 09:05:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1060.282906][T19598] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:51 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 1060.338625][T19603] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1060.371193][T19604] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1060.418527][T19610] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:54 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 09:05:54 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setuid(0x0) keyctl$chown(0x4, r0, 0x0, 0x0) [ 1062.853448][T19625] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1062.877992][T19626] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:54 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:54 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:05:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 09:05:54 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setuid(0x0) keyctl$chown(0x4, r0, 0x0, 0x0) [ 1063.204837][T19645] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1063.223171][T19648] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:54 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 09:05:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d0010"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:54 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d0010"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1063.395024][T19664] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1063.443117][T19666] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:57 executing program 4: sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 09:05:57 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d0010"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:57 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setuid(0x0) keyctl$chown(0x4, r0, 0x0, 0x0) [ 1065.938378][T19680] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1065.959837][T19682] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:57 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {}], 0x2, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:05:57 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:05:57 executing program 4: sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 09:05:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d001000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:57 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:05:57 executing program 4: sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 1066.269181][T19696] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1066.286629][T19701] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:05:57 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d001000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1066.431598][T19715] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:05:58 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d001000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:05:58 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 1066.569502][T19721] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:00 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYBLOB="05b9a69d00100000"], 0x4}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:00 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 1068.964442][T19735] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:00 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) 09:06:00 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:06:00 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 09:06:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYBLOB="05b9a69d00100000"], 0x4}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1069.269786][T19746] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1069.304319][T19750] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:00 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYBLOB="05b9a69d00100000"], 0x4}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x4}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1069.469544][T19764] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x4}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1069.517553][T19766] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:01 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x4}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1069.563984][T19768] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1069.609426][T19771] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:03 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:03 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, 0x0) setuid(r2) keyctl$chown(0x4, r0, r2, 0x0) [ 1072.001471][T19781] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1072.037345][T19782] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:06:03 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:03 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, 0x0, 0x0) 09:06:03 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:06:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:03 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(0x0) keyctl$chown(0x4, r0, r2, 0x0) [ 1072.372159][T19799] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1072.384535][T19800] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:06:03 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:04 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, 0x0, 0x0) [ 1072.524643][T19818] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:04 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1072.679929][T19821] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1072.758083][T19824] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:06 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, 0x0, 0x0) [ 1075.076772][T19834] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:06 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(0x0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:06 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(0x0) keyctl$chown(0x4, r0, r2, 0x0) 09:06:06 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:06:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:06 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 1075.392254][T19846] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:06 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1075.434419][T19851] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1075.473853][T19858] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:07 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 09:06:07 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468000000001800020014000100", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1075.617824][T19868] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1075.677182][T19870] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:09 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468000000001800020014000100", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) [ 1078.112266][T19884] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:09 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:09 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(0x0) keyctl$chown(0x4, r0, r2, 0x0) 09:06:09 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:06:09 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468000000001800020014000100", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:09 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 09:06:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) 09:06:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="00000000000000002800120009000100766574680000000018000200140001000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1078.454352][T19898] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1078.469952][T19895] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1078.590628][T19913] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:10 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="00000000000000002800120009000100766574680000000018000200140001000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:10 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x0) [ 1078.723915][T19920] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:12 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x8, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 09:06:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="00000000000000002800120009000100766574680000000018000200140001000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1081.131422][T19928] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:12 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x8, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 09:06:12 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:12 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, 0x0, r2, 0x0) 09:06:12 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:06:12 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468000000001800020014000100000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1081.490970][T19940] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1081.519588][T19944] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468000000001800020014000100000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1081.714481][T19956] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000280012000900010076657468000000001800020014000100000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1081.872389][T19960] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:13 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x4}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:13 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, 0x0, r2, 0x0) [ 1081.991491][T19962] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1082.099459][T19965] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:06:15 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:15 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:06:15 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x4}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:15 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x8, 0x6, 0x0, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) [ 1084.164679][T19982] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:16 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:16 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, 0x0, r2, 0x0) 09:06:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x4}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x8, 0x6, 0x101}, 0x14}}, 0x0) 09:06:16 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1084.549686][T19998] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1084.581900][T20001] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:06:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x8, 0x6, 0x101}, 0x14}}, 0x0) 09:06:16 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x8, 0x6, 0x101}, 0x14}}, 0x0) [ 1084.711084][T20020] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:16 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x6) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001640)=[{0x0}, {&(0x7f0000000280)}, {&(0x7f00000002c0)="4e92ebe6eb05beb2f004b606f3a04833a4777f03e99ca87ce3e69ee1f77d3c913984649aa6bc0b201670cdf22607740299f842487705aaedd455f0abbf95e884dfae53fcf6fe7b935dfb97179d699be2b41f1ca73ffd3ce3434163a1b30e111b4522756d95cd5c925c3678a700b6048427e68b7b9ddf778bb8180d9bc7f9f86f041b030899d8e892e5c5d5cda86cf84d47dbbe", 0x93}, {0x0}, {0x0}], 0x5, &(0x7f0000001700)=[{0x108, 0x10e, 0x9b, "38b77a9cbf9059a2e861690d29a09b394c87cc83319618588ffba050183cf15611738ccbff0c8c01c2e6f88f2dfa557ff3452e4892ea0e345b90e4eb27afb3f3fdaf1824d8fd1527a57fee9c9111de007b70b8d845dda5c67785d1b01afda00a196bb3daa214e5c94376eb76c0ae696e006f2f00828c0775c6cfe3e00eaee233fda000570415af9072df15ecfad56492d37f60e349d0eaa7d30d389c7a3c1aa0833883bed22e7e5e8e4a776c877b74d0a19defcb1e23f882f3b7dc8f4a0b502564a5b68a65414782f25200a9b3eeba08fb5a3cb07e18c2a95571f7632049de513c427ff281cbcf7dc06d9b9f7732570eda07"}, {0x10}, {0x58, 0x115, 0x7, "526a643c74cf2442f65c96be86d0913d03b7ee07129717c91bc7c8a3d1acfb922d5b0812cd45d6f990eace2bf0c51c00b8f97012a78a259b3462308a169a493c63124ff22a3bb2ec"}, {0x38, 0x0, 0x7ff, "159bd3ccd31458760676abe9e11a28fedf4e7b03dfeef6f5780676b77b5d89c55e52c9215a32a274"}, {0x18, 0x0, 0x1000, "0f"}, {0x10, 0x107, 0x7bcc2357}, {0x10, 0x109}, {0x10, 0x3a, 0x35}], 0x1f0}}], 0x2, 0x0) sendmmsg(r1, &(0x7f0000001f00)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f0000000040)='\a', 0x1}], 0x1, 0x0, 0x0, 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000001c0)='g', 0x1}], 0x1}}], 0x2, 0x0) 09:06:18 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:18 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x6) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001640)=[{0x0}, {&(0x7f0000000280)}, {&(0x7f00000002c0)="4e92ebe6eb05beb2f004b606f3a04833a4777f03e99ca87ce3e69ee1f77d3c913984649aa6bc0b201670cdf22607740299f842487705aaedd455f0abbf95e884dfae53fcf6fe7b935dfb97179d699be2b41f1ca73ffd3ce3434163a1b30e111b4522756d95cd5c925c3678a700b6048427e68b7b9ddf778bb8180d9bc7f9f86f041b030899d8e892e5c5d5cda86cf84d47dbbe", 0x93}, {0x0}, {0x0}], 0x5, &(0x7f0000001700)=[{0x108, 0x10e, 0x9b, "38b77a9cbf9059a2e861690d29a09b394c87cc83319618588ffba050183cf15611738ccbff0c8c01c2e6f88f2dfa557ff3452e4892ea0e345b90e4eb27afb3f3fdaf1824d8fd1527a57fee9c9111de007b70b8d845dda5c67785d1b01afda00a196bb3daa214e5c94376eb76c0ae696e006f2f00828c0775c6cfe3e00eaee233fda000570415af9072df15ecfad56492d37f60e349d0eaa7d30d389c7a3c1aa0833883bed22e7e5e8e4a776c877b74d0a19defcb1e23f882f3b7dc8f4a0b502564a5b68a65414782f25200a9b3eeba08fb5a3cb07e18c2a95571f7632049de513c427ff281cbcf7dc06d9b9f7732570eda07"}, {0x10}, {0x58, 0x115, 0x7, "526a643c74cf2442f65c96be86d0913d03b7ee07129717c91bc7c8a3d1acfb922d5b0812cd45d6f990eace2bf0c51c00b8f97012a78a259b3462308a169a493c63124ff22a3bb2ec"}, {0x38, 0x0, 0x7ff, "159bd3ccd31458760676abe9e11a28fedf4e7b03dfeef6f5780676b77b5d89c55e52c9215a32a274"}, {0x18, 0x0, 0x1000, "0f"}, {0x10, 0x107, 0x7bcc2357}, {0x10, 0x109}, {0x10, 0x3a, 0x35}], 0x1f0}}], 0x2, 0x0) sendmmsg(r1, &(0x7f0000001f00)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f0000000040)='\a', 0x1}], 0x1, 0x0, 0x0, 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000001c0)='g', 0x1}], 0x1}}], 0x2, 0x0) 09:06:18 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00'}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:06:18 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1087.334701][T20058] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:19 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:19 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, 0x0, 0x0) 09:06:19 executing program 4: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x6) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) sendmmsg(r1, &(0x7f0000001c80)=[{{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f00000000c0)="a8", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001640)=[{0x0}, {&(0x7f0000000280)}, {&(0x7f00000002c0)="4e92ebe6eb05beb2f004b606f3a04833a4777f03e99ca87ce3e69ee1f77d3c913984649aa6bc0b201670cdf22607740299f842487705aaedd455f0abbf95e884dfae53fcf6fe7b935dfb97179d699be2b41f1ca73ffd3ce3434163a1b30e111b4522756d95cd5c925c3678a700b6048427e68b7b9ddf778bb8180d9bc7f9f86f041b030899d8e892e5c5d5cda86cf84d47dbbe", 0x93}, {0x0}, {0x0}], 0x5, &(0x7f0000001700)=[{0x108, 0x10e, 0x9b, "38b77a9cbf9059a2e861690d29a09b394c87cc83319618588ffba050183cf15611738ccbff0c8c01c2e6f88f2dfa557ff3452e4892ea0e345b90e4eb27afb3f3fdaf1824d8fd1527a57fee9c9111de007b70b8d845dda5c67785d1b01afda00a196bb3daa214e5c94376eb76c0ae696e006f2f00828c0775c6cfe3e00eaee233fda000570415af9072df15ecfad56492d37f60e349d0eaa7d30d389c7a3c1aa0833883bed22e7e5e8e4a776c877b74d0a19defcb1e23f882f3b7dc8f4a0b502564a5b68a65414782f25200a9b3eeba08fb5a3cb07e18c2a95571f7632049de513c427ff281cbcf7dc06d9b9f7732570eda07"}, {0x10}, {0x58, 0x115, 0x7, "526a643c74cf2442f65c96be86d0913d03b7ee07129717c91bc7c8a3d1acfb922d5b0812cd45d6f990eace2bf0c51c00b8f97012a78a259b3462308a169a493c63124ff22a3bb2ec"}, {0x38, 0x0, 0x7ff, "159bd3ccd31458760676abe9e11a28fedf4e7b03dfeef6f5780676b77b5d89c55e52c9215a32a274"}, {0x18, 0x0, 0x1000, "0f"}, {0x10, 0x107, 0x7bcc2357}, {0x10, 0x109}, {0x10, 0x3a, 0x35}], 0x1f0}}], 0x2, 0x0) sendmmsg(r1, &(0x7f0000001f00)=[{{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f0000000040)='\a', 0x1}], 0x1, 0x0, 0x0, 0x1}}, {{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000001c0)='g', 0x1}], 0x1}}], 0x2, 0x0) [ 1087.588694][T20062] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 1087.597451][ C0] [ 1087.597455][ C0] ===================================== [ 1087.597458][ C0] WARNING: bad unlock balance detected! [ 1087.597464][ C0] 5.6.0-rc7-syzkaller #0 Not tainted [ 1087.597466][ C0] ------------------------------------- [ 1087.597470][ C0] syz-executor.3/20062 is trying to release lock (rcu_callback) at: [ 1087.597487][ C0] [] rcu_lock_release+0x0/0x20 [ 1087.597490][ C0] but there are no more locks to release! [ 1087.597493][ C0] [ 1087.597493][ C0] other info that might help us debug this: [ 1087.597498][ C0] 1 lock held by syz-executor.3/20062: [ 1087.597500][ C0] #0: ffff8880a8d740d8 (&type->s_umount_key#56/1){+.+.}, at: alloc_super+0x160/0x760 [ 1087.597525][ C0] [ 1087.597525][ C0] stack backtrace: [ 1087.597534][ C0] CPU: 0 PID: 20062 Comm: syz-executor.3 Not tainted 5.6.0-rc7-syzkaller #0 [ 1087.597538][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.597541][ C0] Call Trace: [ 1087.597554][ C0] [ 1087.597563][ C0] dump_stack+0x1e9/0x30e [ 1087.597572][ C0] ? rcu_lock_acquire+0x30/0x30 [ 1087.597582][ C0] print_unlock_imbalance_bug+0x20b/0x240 [ 1087.597592][ C0] ? do_raw_spin_unlock+0x134/0x8d0 [ 1087.597607][ C0] ? __bitmap_andnot+0x316/0x330 [ 1087.597618][ C0] lock_release+0x37c/0x720 [ 1087.597627][ C0] ? rcu_lock_acquire+0x30/0x30 [ 1087.597634][ C0] ? zap_class+0xd30/0xd30 [ 1087.597642][ C0] rcu_core+0x7f0/0x1080 [ 1087.597657][ C0] __do_softirq+0x268/0x7c5 [ 1087.597668][ C0] ? irq_exit+0x223/0x230 [ 1087.597678][ C0] irq_exit+0x223/0x230 [ 1087.597687][ C0] smp_apic_timer_interrupt+0x113/0x280 [ 1087.597695][ C0] apic_timer_interrupt+0xf/0x20 [ 1087.597698][ C0] [ 1087.597706][ C0] RIP: 0010:console_unlock+0xa25/0xec0 [ 1087.597714][ C0] Code: 20 00 74 0c 48 c7 c7 18 d4 0a 89 e8 35 c0 52 00 48 83 3d 15 ae ac 07 00 0f 84 65 04 00 00 e8 12 80 16 00 48 8b 7c 24 10 57 9d <0f> 1f 44 00 00 f6 44 24 07 01 75 52 e8 fa 7f 16 00 eb 63 0f 1f 84 [ 1087.597719][ C0] RSP: 0018:ffffc90007a5f980 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 1087.597727][ C0] RAX: ffffffff815e260e RBX: 0000000000000200 RCX: 0000000000040000 [ 1087.597732][ C0] RDX: ffffc90010a08000 RSI: 000000000000db3b RDI: 0000000000000282 [ 1087.597736][ C0] RBP: ffffc90007a5fa38 R08: ffffffff817a3210 R09: fffffbfff121aff9 [ 1087.597741][ C0] R10: fffffbfff121aff9 R11: 0000000000000000 R12: dffffc0000000000 [ 1087.597746][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: ffffffff892be558 [ 1087.597758][ C0] ? trace_hardirqs_on+0x30/0x70 [ 1087.597764][ C0] ? console_unlock+0xa1e/0xec0 [ 1087.597779][ C0] ? __down_trylock_console_sem+0x178/0x1b0 [ 1087.597785][ C0] ? vprintk_emit+0x1db/0x3b0 [ 1087.597790][ C0] ? vprintk_emit+0x1db/0x3b0 [ 1087.597799][ C0] vprintk_emit+0x1f8/0x3b0 [ 1087.597808][ C0] printk+0x62/0x83 [ 1087.597817][ C0] ? __ntfs_error+0x15e/0x190 [ 1087.597826][ C0] __ntfs_error+0x185/0x190 [ 1087.597837][ C0] ? filemap_check_errors+0xd2/0x120 09:06:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1087.597845][ C0] ? ntfs_fill_super+0x61d/0x89f0 [ 1087.597855][ C0] ? sb_min_blocksize+0x146/0x1a0 [ 1087.597864][ C0] ntfs_fill_super+0x1134/0x89f0 [ 1087.597871][ C0] ? pointer+0x23f/0x7c0 [ 1087.597888][ C0] ? snprintf+0x6f/0x90 [ 1087.597896][ C0] ? set_blocksize+0x1a8/0x3b0 [ 1087.597906][ C0] mount_bdev+0x232/0x340 [ 1087.597914][ C0] ? ntfs_mount+0x40/0x40 [ 1087.597925][ C0] legacy_get_tree+0xea/0x180 [ 1087.597933][ C0] ? ntfs_rl_punch_nolock+0x17d0/0x17d0 [ 1087.597941][ C0] vfs_get_tree+0x88/0x270 09:06:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f00000001c0)={@void, @val={0x5}, @mpls={[], @ipv4=@dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x84, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "f4f522", 0x1, '\a\x00`'}}}}}, 0x2e) [ 1087.597951][ C0] do_mount+0x17d5/0x2440 [ 1087.597961][ C0] ? _copy_from_user+0x116/0x170 [ 1087.597972][ C0] __se_sys_mount+0xd3/0x100 [ 1087.597983][ C0] do_syscall_64+0xf3/0x1b0 [ 1087.597995][ C0] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1087.598002][ C0] RIP: 0033:0x45f29a [ 1087.598009][ C0] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 2a 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 1087.598014][ C0] RSP: 002b:00007fad5fa8aa68 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1087.598021][ C0] RAX: ffffffffffffffda RBX: 00007fad5fa8b6d4 RCX: 000000000045f29a [ 1087.598026][ C0] RDX: 00007fad5fa8aae0 RSI: 00000000200000c0 RDI: 00007fad5fa8ab00 [ 1087.598030][ C0] RBP: 000000000076bf00 R08: 00007fad5fa8ab40 R09: 00007fad5fa8aae0 [ 1087.598035][ C0] R10: 0000000000000000 R11: 0000000000000206 R12: 00000000ffffffff [ 1087.598039][ C0] R13: 0000000000000be7 R14: 00000000004ce08e R15: 000000000076bf0c [ 1087.923487][T20076] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:19 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, 0x0, 0x0) 09:06:19 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) [ 1088.231476][T20096] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:06:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x4}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1088.402326][T20111] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:21 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") write$tun(r0, &(0x7f00000001c0)={@void, @val={0x5}, @mpls={[], @ipv4=@dccp={{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x84, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "f4f522", 0x1, '\a\x00`'}}}}}, 0x2e) 09:06:21 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:06:21 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x4}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:21 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) [ 1090.263615][T20127] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:22 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:22 executing program 3: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='fmask=00000000000000000000000,disable_sparse=no,case_sensitive']) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r0, r0, r0}, &(0x7f0000000140)=""/83, 0x53, &(0x7f0000000000)={&(0x7f0000000040)={'poly1305-simd\x00'}}) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r2) keyctl$chown(0x4, r0, 0x0, 0x0) 09:06:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x4}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:22 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 09:06:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1090.665254][T20142] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1090.686112][T20144] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 09:06:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1090.716377][T20152] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1090.796851][T20159] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1090.839642][T20161] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:22 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1090.880327][T20163] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1090.920147][T20165] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:24 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 09:06:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:24 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="48000000100005070000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1093.281888][T20175] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:25 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) socket$inet(0x2, 0x0, 0xfffffff9) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x20000000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) dup2(r0, r1) 09:06:25 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', {0x7, 0x0, @empty}}) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:06:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 09:06:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) [ 1093.720427][T20194] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) socket$inet(0x2, 0x0, 0xfffffff9) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x20000000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) dup2(r0, r1) 09:06:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) socket$inet(0x2, 0x0, 0xfffffff9) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x20000000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) dup2(r0, r1) [ 1093.819509][T20210] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:25 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700000000000000", @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 09:06:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) socket$inet(0x2, 0x0, 0xfffffff9) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x20000000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) dup2(r0, r1) 09:06:28 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a9489b1024804817a36", @ANYRES64], 0x0, 0x47}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:28 executing program 4: sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 09:06:28 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syzkaller1\x00', 0xa732}) r4 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r4, 0x8914, 0x0) write$tun(r1, &(0x7f0000000140)={@void, @void, @eth={@link_local, @dev, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "2d2cfc", 0x31, 0x6, 0x0, @local, @remote, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, {[@nop, @mss={0x2, 0x4}, @mptcp=@generic={0x0, 0xe, "713ae408fe6ee5295b7219a9"}, @exp_smc={0xfe, 0x6}]}}, {'|'}}}}}}}}, 0x6b) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1000000c8) splice(r0, 0x0, r2, 0x0, 0x10007, 0x0) 09:06:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) socket$inet(0x2, 0x0, 0xfffffff9) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x20000000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, 0xffffffffffffffff) [ 1096.722972][T20236] __nla_validate_parse: 1 callbacks suppressed [ 1096.722979][T20236] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="e2b2cbff9c9f34e529cf55c67074e9be3186f53947483308b74cff6976793c28f1efe260bba0f4c2cd917535469a18e05442aea8fc9a", @ANYRES64], 0x0, 0x3e}, 0x20) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x33) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x7, r0, 0x0, 0x0) 09:06:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:28 executing program 4: sendmsg$IPSET_CMD_SAVE(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, 0x8, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) 09:06:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/18, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) socket$inet(0x2, 0x0, 0xfffffff9) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x20000000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, 0xffffffffffffffff) [ 1096.823094][T20250] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 09:06:28 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/19, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="05b9a69d00100000"], 0x5}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000340)=@newtfilter={0x38, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_basic={{0xa, 0x1, 'basic\x00'}, {0x3, 0x2, [@TCA_BASIC_EMATCHES={0x4}]}}]}, 0x38}}, 0x0) 09:06:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0) socket$inet(0x2, 0x0, 0xfffffff9) socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x0) sendmsg$can_bcm(0xffffffffffffffff, 0x0, 0x20000000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, 0xffffffffffffffff) [ 1096.870476][T20256] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1096.948194][T20264] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'.