/0x20 [ 173.345302][ T9910] ? kmem_cache_alloc+0x11a/0x6f0 [ 173.350321][ T9910] ? getname_flags+0xd6/0x5b0 [ 173.355008][ T9910] ? getname+0x1a/0x20 [ 173.359096][ T9910] ? do_sys_open+0x2c9/0x5d0 [ 173.363689][ T9910] ? __x64_sys_open+0x7e/0xc0 [ 173.368367][ T9910] ? do_syscall_64+0x103/0x610 [ 173.373129][ T9910] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.379226][ T9910] ? __lock_acquire+0x548/0x3fb0 [ 173.384362][ T9910] ? __lock_acquire+0x548/0x3fb0 [ 173.389300][ T9910] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 173.394717][ T9910] ? __alloc_fd+0x430/0x530 [ 173.399242][ T9910] do_filp_open+0x1a1/0x280 [ 173.403797][ T9910] ? may_open_dev+0x100/0x100 [ 173.408483][ T9910] ? lock_downgrade+0x880/0x880 [ 173.413349][ T9910] ? kasan_check_read+0x11/0x20 [ 173.418218][ T9910] ? do_raw_spin_unlock+0x57/0x270 [ 173.423323][ T9910] ? _raw_spin_unlock+0x2d/0x50 [ 173.428165][ T9910] ? __alloc_fd+0x430/0x530 [ 173.432684][ T9910] do_sys_open+0x3fe/0x5d0 [ 173.437238][ T9910] ? filp_open+0x80/0x80 [ 173.441475][ T9910] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 173.447711][ T9910] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 173.453176][ T9910] ? do_syscall_64+0x26/0x610 [ 173.457868][ T9910] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.463938][ T9910] ? do_syscall_64+0x26/0x610 [ 173.468623][ T9910] __x64_sys_open+0x7e/0xc0 [ 173.473136][ T9910] do_syscall_64+0x103/0x610 [ 173.477732][ T9910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.483622][ T9910] RIP: 0033:0x412291 [ 173.487513][ T9910] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 22:13:24 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x894c, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:24 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='%tfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:24 executing program 4 (fault-call:0 fault-nth:7): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 173.507666][ T9910] RSP: 002b:00007fb8aede9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 173.516086][ T9910] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412291 [ 173.524051][ T9910] RDX: 00007fb8aede9b0a RSI: 0000000000000002 RDI: 00007fb8aede9b00 [ 173.532023][ T9910] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 173.540001][ T9910] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 173.547968][ T9910] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 173.659327][ T9926] FAULT_INJECTION: forcing a failure. [ 173.659327][ T9926] name failslab, interval 1, probability 0, space 0, times 0 [ 173.686128][ T9926] CPU: 1 PID: 9926 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 173.694124][ T9926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 22:13:24 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8970, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfx\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 173.708348][ T9926] Call Trace: [ 173.712450][ T9926] dump_stack+0x172/0x1f0 [ 173.716809][ T9926] should_fail.cold+0xa/0x15 [ 173.721429][ T9926] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 173.727261][ T9926] ? ___might_sleep+0x163/0x280 [ 173.732140][ T9926] __should_failslab+0x121/0x190 [ 173.737096][ T9926] should_failslab+0x9/0x14 [ 173.741618][ T9926] kmem_cache_alloc+0x2b2/0x6f0 [ 173.746496][ T9926] ? __save_stack_trace+0x99/0x100 [ 173.751619][ T9926] __alloc_file+0x27/0x300 [ 173.756034][ T9926] alloc_empty_file+0x72/0x170 [ 173.762116][ T9926] path_openat+0xef/0x46e0 [ 173.766721][ T9926] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 173.772548][ T9926] ? kasan_slab_alloc+0xf/0x20 [ 173.777347][ T9926] ? kmem_cache_alloc+0x11a/0x6f0 [ 173.782373][ T9926] ? getname_flags+0xd6/0x5b0 [ 173.787045][ T9926] ? getname+0x1a/0x20 [ 173.791113][ T9926] ? do_sys_open+0x2c9/0x5d0 [ 173.795703][ T9926] ? __x64_sys_open+0x7e/0xc0 [ 173.800384][ T9926] ? do_syscall_64+0x103/0x610 [ 173.805162][ T9926] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.811241][ T9926] ? __lock_acquire+0x548/0x3fb0 [ 173.816177][ T9926] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 173.821585][ T9926] ? zram_make_request+0xe0/0xc09 [ 173.826620][ T9926] ? __alloc_fd+0x430/0x530 [ 173.831145][ T9926] do_filp_open+0x1a1/0x280 [ 173.835648][ T9926] ? may_open_dev+0x100/0x100 [ 173.840417][ T9926] ? lock_downgrade+0x880/0x880 [ 173.845267][ T9926] ? kasan_check_read+0x11/0x20 [ 173.850125][ T9926] ? do_raw_spin_unlock+0x57/0x270 [ 173.855260][ T9926] ? _raw_spin_unlock+0x2d/0x50 [ 173.860118][ T9926] ? __alloc_fd+0x430/0x530 [ 173.864654][ T9926] do_sys_open+0x3fe/0x5d0 [ 173.869089][ T9926] ? filp_open+0x80/0x80 [ 173.873339][ T9926] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 173.879580][ T9926] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 173.885066][ T9926] ? do_syscall_64+0x26/0x610 [ 173.889767][ T9926] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.895828][ T9926] ? do_syscall_64+0x26/0x610 [ 173.900521][ T9926] __x64_sys_open+0x7e/0xc0 [ 173.905022][ T9926] do_syscall_64+0x103/0x610 [ 173.909609][ T9926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 173.915492][ T9926] RIP: 0033:0x412291 [ 173.919393][ T9926] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 173.939015][ T9926] RSP: 002b:00007fb8aede9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 173.947420][ T9926] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412291 22:13:24 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x14000000}], 0x83) 22:13:24 executing program 4 (fault-call:0 fault-nth:8): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 173.955384][ T9926] RDX: 00007fb8aede9b0a RSI: 0000000000000002 RDI: 00007fb8aede9b00 [ 173.963433][ T9926] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 173.971421][ T9926] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 173.979386][ T9926] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x4, 0x2}], 0x83) [ 174.116731][ T9935] FAULT_INJECTION: forcing a failure. [ 174.116731][ T9935] name failslab, interval 1, probability 0, space 0, times 0 22:13:25 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8971, &(0x7f0000000040)={'syzkaller0\x00'}) [ 174.177183][ T9935] CPU: 1 PID: 9935 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 174.185255][ T9935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.195333][ T9935] Call Trace: [ 174.198654][ T9935] dump_stack+0x172/0x1f0 [ 174.203016][ T9935] should_fail.cold+0xa/0x15 [ 174.207809][ T9935] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 174.213643][ T9935] ? ___might_sleep+0x163/0x280 [ 174.218527][ T9935] __should_failslab+0x121/0x190 [ 174.223478][ T9935] should_failslab+0x9/0x14 [ 174.227980][ T9935] kmem_cache_alloc+0x2b2/0x6f0 [ 174.232831][ T9935] ? rcu_read_lock_sched_held+0x110/0x130 [ 174.238576][ T9935] ? kmem_cache_alloc+0x32e/0x6f0 [ 174.243616][ T9935] security_file_alloc+0x39/0x170 [ 174.248637][ T9935] __alloc_file+0xac/0x300 [ 174.253048][ T9935] alloc_empty_file+0x72/0x170 [ 174.257816][ T9935] path_openat+0xef/0x46e0 [ 174.262248][ T9935] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 174.268053][ T9935] ? kasan_slab_alloc+0xf/0x20 [ 174.272822][ T9935] ? kmem_cache_alloc+0x11a/0x6f0 [ 174.277871][ T9935] ? getname_flags+0xd6/0x5b0 [ 174.282540][ T9935] ? getname+0x1a/0x20 [ 174.286599][ T9935] ? do_sys_open+0x2c9/0x5d0 [ 174.291178][ T9935] ? __x64_sys_open+0x7e/0xc0 [ 174.295857][ T9935] ? do_syscall_64+0x103/0x610 [ 174.300631][ T9935] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.306704][ T9935] ? __lock_acquire+0x548/0x3fb0 [ 174.311658][ T9935] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 174.317035][ T9935] ? __alloc_fd+0x430/0x530 [ 174.321542][ T9935] do_filp_open+0x1a1/0x280 [ 174.326053][ T9935] ? may_open_dev+0x100/0x100 [ 174.330836][ T9935] ? lock_downgrade+0x880/0x880 [ 174.335687][ T9935] ? kasan_check_read+0x11/0x20 [ 174.340535][ T9935] ? do_raw_spin_unlock+0x57/0x270 [ 174.345640][ T9935] ? _raw_spin_unlock+0x2d/0x50 [ 174.350487][ T9935] ? __alloc_fd+0x430/0x530 [ 174.354992][ T9935] do_sys_open+0x3fe/0x5d0 [ 174.359407][ T9935] ? filp_open+0x80/0x80 [ 174.363643][ T9935] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 174.370080][ T9935] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 174.375549][ T9935] ? do_syscall_64+0x26/0x610 [ 174.380228][ T9935] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.386319][ T9935] ? do_syscall_64+0x26/0x610 [ 174.391006][ T9935] __x64_sys_open+0x7e/0xc0 [ 174.395500][ T9935] do_syscall_64+0x103/0x610 [ 174.400101][ T9935] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.405983][ T9935] RIP: 0033:0x412291 22:13:25 executing program 4 (fault-call:0 fault-nth:9): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 174.409883][ T9935] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 19 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 174.429487][ T9935] RSP: 002b:00007fb8aede9a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 174.437889][ T9935] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000412291 [ 174.445869][ T9935] RDX: 00007fb8aede9b0a RSI: 0000000000000002 RDI: 00007fb8aede9b00 [ 174.453880][ T9935] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 174.461885][ T9935] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 174.469855][ T9935] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:25 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x15000000}], 0x83) [ 174.587138][ T9964] FAULT_INJECTION: forcing a failure. [ 174.587138][ T9964] name failslab, interval 1, probability 0, space 0, times 0 [ 174.624601][ T9964] CPU: 0 PID: 9964 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 174.632551][ T9964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 174.642617][ T9964] Call Trace: [ 174.645927][ T9964] dump_stack+0x172/0x1f0 [ 174.650277][ T9964] should_fail.cold+0xa/0x15 [ 174.654916][ T9964] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 174.660746][ T9964] ? ___might_sleep+0x163/0x280 [ 174.665598][ T9964] __should_failslab+0x121/0x190 [ 174.670526][ T9964] ? loop_info64_to_compat+0x6d0/0x6d0 [ 174.675987][ T9964] should_failslab+0x9/0x14 [ 174.680476][ T9964] kmem_cache_alloc_trace+0x2d1/0x760 [ 174.685836][ T9964] ? lockdep_init_map+0x1be/0x6d0 [ 174.690853][ T9964] ? loop_info64_to_compat+0x6d0/0x6d0 [ 174.696304][ T9964] __kthread_create_on_node+0xf2/0x460 [ 174.701751][ T9964] ? lock_acquire+0x16f/0x3f0 [ 174.706413][ T9964] ? kthread_parkme+0xb0/0xb0 [ 174.711110][ T9964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 174.717343][ T9964] ? kasan_check_read+0x11/0x20 [ 174.722223][ T9964] ? mutex_trylock+0x1e0/0x1e0 [ 174.726984][ T9964] ? loop_info64_to_compat+0x6d0/0x6d0 [ 174.732438][ T9964] kthread_create_on_node+0xbb/0xf0 [ 174.737626][ T9964] ? __kthread_create_on_node+0x460/0x460 [ 174.743335][ T9964] ? lockdep_init_map+0x1be/0x6d0 [ 174.748361][ T9964] ? lockdep_init_map+0x1be/0x6d0 [ 174.753373][ T9964] lo_ioctl+0xc1b/0x2150 [ 174.757599][ T9964] ? lo_rw_aio+0x1120/0x1120 [ 174.762172][ T9964] blkdev_ioctl+0x6f2/0x1d10 [ 174.766772][ T9964] ? blkpg_ioctl+0xa90/0xa90 [ 174.771351][ T9964] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 174.777142][ T9964] ? __fget+0x35a/0x550 [ 174.781304][ T9964] block_ioctl+0xee/0x130 [ 174.785623][ T9964] ? blkdev_fallocate+0x410/0x410 [ 174.792346][ T9964] do_vfs_ioctl+0xd6e/0x1390 [ 174.796973][ T9964] ? ioctl_preallocate+0x210/0x210 [ 174.802099][ T9964] ? __fget+0x381/0x550 [ 174.806247][ T9964] ? ksys_dup3+0x3e0/0x3e0 [ 174.810650][ T9964] ? do_sys_open+0x31d/0x5d0 [ 174.815235][ T9964] ? tomoyo_file_ioctl+0x23/0x30 [ 174.820159][ T9964] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 174.826391][ T9964] ? security_file_ioctl+0x93/0xc0 [ 174.831488][ T9964] ksys_ioctl+0xab/0xd0 [ 174.835629][ T9964] __x64_sys_ioctl+0x73/0xb0 [ 174.840330][ T9964] do_syscall_64+0x103/0x610 [ 174.844916][ T9964] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 174.850813][ T9964] RIP: 0033:0x458167 [ 174.854691][ T9964] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 174.874307][ T9964] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:13:25 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8980, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:25 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='n\nfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 174.882713][ T9964] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458167 [ 174.890675][ T9964] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 174.899713][ T9964] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 174.907683][ T9964] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 174.915646][ T9964] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:25 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8981, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:25 executing program 4 (fault-call:0 fault-nth:10): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x02', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x5, 0x2}], 0x83) 22:13:25 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) [ 175.132002][ T9980] FAULT_INJECTION: forcing a failure. [ 175.132002][ T9980] name failslab, interval 1, probability 0, space 0, times 0 [ 175.145072][ T9980] CPU: 0 PID: 9980 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 175.152981][ T9980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 175.163047][ T9980] Call Trace: [ 175.166361][ T9980] dump_stack+0x172/0x1f0 [ 175.170709][ T9980] should_fail.cold+0xa/0x15 [ 175.175325][ T9980] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 175.181160][ T9980] ? ___might_sleep+0x163/0x280 [ 175.186046][ T9980] __should_failslab+0x121/0x190 [ 175.190990][ T9980] should_failslab+0x9/0x14 [ 175.195502][ T9980] kmem_cache_alloc+0x2b2/0x6f0 [ 175.200362][ T9980] ? __schedule+0x1387/0x1cc0 [ 175.205054][ T9980] __kernfs_new_node+0xef/0x690 [ 175.209916][ T9980] ? _raw_spin_unlock_irq+0x28/0x90 [ 175.215127][ T9980] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 175.220597][ T9980] ? kasan_check_read+0x11/0x20 [ 175.225459][ T9980] ? _raw_spin_unlock_irq+0x5e/0x90 22:13:26 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8983, &(0x7f0000000040)={'syzkaller0\x00'}) [ 175.230663][ T9980] ? __schedule+0x1387/0x1cc0 [ 175.235356][ T9980] ? __lock_acquire+0x548/0x3fb0 [ 175.240309][ T9980] kernfs_new_node+0x99/0x130 [ 175.245004][ T9980] kernfs_create_dir_ns+0x52/0x160 [ 175.250131][ T9980] internal_create_group+0x7f8/0xc40 [ 175.255427][ T9980] ? bd_set_size+0x89/0xb0 [ 175.259869][ T9980] ? remove_files.isra.0+0x190/0x190 [ 175.265185][ T9980] sysfs_create_group+0x20/0x30 [ 175.270061][ T9980] lo_ioctl+0x10af/0x2150 [ 175.274393][ T9980] ? lo_rw_aio+0x1120/0x1120 [ 175.278987][ T9980] blkdev_ioctl+0x6f2/0x1d10 [ 175.283574][ T9980] ? blkpg_ioctl+0xa90/0xa90 [ 175.288167][ T9980] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 175.293995][ T9980] ? __fget+0x35a/0x550 [ 175.298157][ T9980] block_ioctl+0xee/0x130 [ 175.302482][ T9980] ? blkdev_fallocate+0x410/0x410 [ 175.307523][ T9980] do_vfs_ioctl+0xd6e/0x1390 [ 175.312133][ T9980] ? ioctl_preallocate+0x210/0x210 [ 175.317259][ T9980] ? __fget+0x381/0x550 [ 175.321418][ T9980] ? ksys_dup3+0x3e0/0x3e0 [ 175.325839][ T9980] ? do_sys_open+0x31d/0x5d0 [ 175.330438][ T9980] ? tomoyo_file_ioctl+0x23/0x30 [ 175.335375][ T9980] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 175.341619][ T9980] ? security_file_ioctl+0x93/0xc0 [ 175.346753][ T9980] ksys_ioctl+0xab/0xd0 [ 175.350913][ T9980] __x64_sys_ioctl+0x73/0xb0 [ 175.355503][ T9980] do_syscall_64+0x103/0x610 [ 175.360099][ T9980] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 175.365986][ T9980] RIP: 0033:0x458167 [ 175.369907][ T9980] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 175.389522][ T9980] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 175.397939][ T9980] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458167 [ 175.405903][ T9980] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 175.413883][ T9980] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 175.421868][ T9980] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 22:13:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x16000000}], 0x83) [ 175.429845][ T9980] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 175.495331][ T9980] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x11, 0x2}], 0x83) 22:13:26 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8990, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:26 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='n%fs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x1f000000}], 0x83) 22:13:26 executing program 4 (fault-call:0 fault-nth:11): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x12, 0x2}], 0x83) 22:13:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x03', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x3f000000}], 0x83) 22:13:26 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8992, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:26 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='nTfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 175.990399][T10034] FAULT_INJECTION: forcing a failure. [ 175.990399][T10034] name failslab, interval 1, probability 0, space 0, times 0 [ 176.008067][T10034] CPU: 1 PID: 10034 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 176.016141][T10034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.026244][T10034] Call Trace: [ 176.029538][T10034] dump_stack+0x172/0x1f0 [ 176.033868][T10034] should_fail.cold+0xa/0x15 [ 176.038464][T10034] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 176.044271][T10034] ? ___might_sleep+0x163/0x280 [ 176.049124][T10034] __should_failslab+0x121/0x190 [ 176.054060][T10034] should_failslab+0x9/0x14 [ 176.058584][T10034] kmem_cache_alloc+0x2b2/0x6f0 [ 176.063453][T10034] ? __schedule+0x1387/0x1cc0 [ 176.068134][T10034] __kernfs_new_node+0xef/0x690 [ 176.072984][T10034] ? _raw_spin_unlock_irq+0x28/0x90 [ 176.078216][T10034] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 176.083696][T10034] ? kasan_check_read+0x11/0x20 [ 176.088579][T10034] ? _raw_spin_unlock_irq+0x5e/0x90 [ 176.093787][T10034] ? __schedule+0x1387/0x1cc0 [ 176.098578][T10034] ? __lock_acquire+0x548/0x3fb0 [ 176.103799][T10034] kernfs_new_node+0x99/0x130 [ 176.108664][T10034] kernfs_create_dir_ns+0x52/0x160 [ 176.113793][T10034] internal_create_group+0x7f8/0xc40 [ 176.119103][T10034] ? bd_set_size+0x89/0xb0 [ 176.123523][T10034] ? remove_files.isra.0+0x190/0x190 [ 176.128826][T10034] sysfs_create_group+0x20/0x30 [ 176.133685][T10034] lo_ioctl+0x10af/0x2150 [ 176.138059][T10034] ? lo_rw_aio+0x1120/0x1120 [ 176.142649][T10034] blkdev_ioctl+0x6f2/0x1d10 [ 176.147245][T10034] ? blkpg_ioctl+0xa90/0xa90 [ 176.151831][T10034] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 176.157663][T10034] ? __fget+0x35a/0x550 [ 176.161826][T10034] block_ioctl+0xee/0x130 [ 176.166159][T10034] ? blkdev_fallocate+0x410/0x410 [ 176.171183][T10034] do_vfs_ioctl+0xd6e/0x1390 [ 176.175798][T10034] ? ioctl_preallocate+0x210/0x210 [ 176.180910][T10034] ? __fget+0x381/0x550 [ 176.185076][T10034] ? ksys_dup3+0x3e0/0x3e0 [ 176.189490][T10034] ? do_sys_open+0x31d/0x5d0 [ 176.194091][T10034] ? tomoyo_file_ioctl+0x23/0x30 [ 176.199027][T10034] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 176.205271][T10034] ? security_file_ioctl+0x93/0xc0 [ 176.210382][T10034] ksys_ioctl+0xab/0xd0 [ 176.214535][T10034] __x64_sys_ioctl+0x73/0xb0 [ 176.219135][T10034] do_syscall_64+0x103/0x610 [ 176.223762][T10034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.229680][T10034] RIP: 0033:0x458167 [ 176.233581][T10034] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.253179][T10034] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 176.261620][T10034] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458167 [ 176.269616][T10034] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 176.277579][T10034] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 176.285546][T10034] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 176.293515][T10034] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 176.317302][T10034] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x15, 0x2}], 0x83) 22:13:27 executing program 4 (fault-call:0 fault-nth:12): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:27 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8993, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0xfa000000}], 0x83) 22:13:27 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='n\xa4fs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 176.595090][T10066] FAULT_INJECTION: forcing a failure. [ 176.595090][T10066] name failslab, interval 1, probability 0, space 0, times 0 [ 176.628557][T10066] CPU: 1 PID: 10066 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 176.636598][T10066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 176.646675][T10066] Call Trace: [ 176.650045][T10066] dump_stack+0x172/0x1f0 [ 176.654399][T10066] should_fail.cold+0xa/0x15 [ 176.659022][T10066] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 176.664859][T10066] ? ___might_sleep+0x163/0x280 [ 176.669732][T10066] __should_failslab+0x121/0x190 [ 176.674696][T10066] should_failslab+0x9/0x14 [ 176.679220][T10066] kmem_cache_alloc+0x2b2/0x6f0 [ 176.684145][T10066] ? lock_downgrade+0x880/0x880 [ 176.689070][T10066] ? kasan_check_read+0x11/0x20 [ 176.693919][T10066] __kernfs_new_node+0xef/0x690 [ 176.698784][T10066] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 176.704261][T10066] ? wait_for_completion+0x440/0x440 [ 176.709556][T10066] ? mutex_unlock+0xd/0x10 [ 176.713972][T10066] ? kernfs_activate+0x192/0x1f0 [ 176.718911][T10066] kernfs_new_node+0x99/0x130 [ 176.723628][T10066] __kernfs_create_file+0x51/0x340 [ 176.728756][T10066] sysfs_add_file_mode_ns+0x222/0x560 [ 176.734138][T10066] internal_create_group+0x35b/0xc40 [ 176.739436][T10066] ? bd_set_size+0x89/0xb0 [ 176.743877][T10066] ? remove_files.isra.0+0x190/0x190 [ 176.749183][T10066] sysfs_create_group+0x20/0x30 [ 176.754063][T10066] lo_ioctl+0x10af/0x2150 [ 176.758403][T10066] ? lo_rw_aio+0x1120/0x1120 [ 176.763007][T10066] blkdev_ioctl+0x6f2/0x1d10 [ 176.767621][T10066] ? blkpg_ioctl+0xa90/0xa90 [ 176.772222][T10066] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 176.778062][T10066] ? __fget+0x35a/0x550 [ 176.782231][T10066] block_ioctl+0xee/0x130 [ 176.786560][T10066] ? blkdev_fallocate+0x410/0x410 [ 176.791590][T10066] do_vfs_ioctl+0xd6e/0x1390 [ 176.796181][T10066] ? ioctl_preallocate+0x210/0x210 [ 176.801312][T10066] ? __fget+0x381/0x550 [ 176.805477][T10066] ? ksys_dup3+0x3e0/0x3e0 [ 176.809889][T10066] ? do_sys_open+0x31d/0x5d0 [ 176.814477][T10066] ? tomoyo_file_ioctl+0x23/0x30 [ 176.819436][T10066] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 176.825694][T10066] ? security_file_ioctl+0x93/0xc0 [ 176.830824][T10066] ksys_ioctl+0xab/0xd0 [ 176.835048][T10066] __x64_sys_ioctl+0x73/0xb0 [ 176.839646][T10066] do_syscall_64+0x103/0x610 [ 176.844242][T10066] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 176.850163][T10066] RIP: 0033:0x458167 [ 176.854060][T10066] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 176.873661][T10066] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 176.882064][T10066] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458167 22:13:27 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8994, &(0x7f0000000040)={'syzkaller0\x00'}) [ 176.890039][T10066] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 176.898018][T10066] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 176.905981][T10066] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 176.913944][T10066] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:27 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x04', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x16, 0x2}], 0x83) 22:13:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x1000000000000}], 0x83) [ 177.045391][T10066] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:28 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8995, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:28 executing program 4 (fault-call:0 fault-nth:13): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x2}], 0x83) 22:13:28 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) [ 177.404256][T10115] FAULT_INJECTION: forcing a failure. [ 177.404256][T10115] name failslab, interval 1, probability 0, space 0, times 0 [ 177.429022][T10115] CPU: 0 PID: 10115 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 177.437242][T10115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 177.437250][T10115] Call Trace: [ 177.437280][T10115] dump_stack+0x172/0x1f0 [ 177.437306][T10115] should_fail.cold+0xa/0x15 [ 177.437329][T10115] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 177.465587][T10115] ? ___might_sleep+0x163/0x280 [ 177.470451][T10115] __should_failslab+0x121/0x190 [ 177.475401][T10115] should_failslab+0x9/0x14 [ 177.479906][T10115] kmem_cache_alloc+0x2b2/0x6f0 [ 177.479923][T10115] ? lock_downgrade+0x880/0x880 [ 177.479936][T10115] ? kasan_check_read+0x11/0x20 [ 177.479956][T10115] __kernfs_new_node+0xef/0x690 [ 177.479975][T10115] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 177.480001][T10115] ? wait_for_completion+0x440/0x440 [ 177.489705][T10115] ? mutex_unlock+0xd/0x10 [ 177.489722][T10115] ? kernfs_activate+0x192/0x1f0 [ 177.489741][T10115] kernfs_new_node+0x99/0x130 [ 177.489762][T10115] __kernfs_create_file+0x51/0x340 [ 177.489778][T10115] sysfs_add_file_mode_ns+0x222/0x560 [ 177.489799][T10115] internal_create_group+0x35b/0xc40 [ 177.489813][T10115] ? bd_set_size+0x89/0xb0 [ 177.489835][T10115] ? remove_files.isra.0+0x190/0x190 [ 177.489861][T10115] sysfs_create_group+0x20/0x30 22:13:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x100000000000000}], 0x83) [ 177.489877][T10115] lo_ioctl+0x10af/0x2150 [ 177.489896][T10115] ? lo_rw_aio+0x1120/0x1120 [ 177.489917][T10115] blkdev_ioctl+0x6f2/0x1d10 [ 177.505064][T10115] ? blkpg_ioctl+0xa90/0xa90 [ 177.505082][T10115] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 177.505106][T10115] ? __fget+0x35a/0x550 [ 177.524384][T10115] block_ioctl+0xee/0x130 [ 177.524400][T10115] ? blkdev_fallocate+0x410/0x410 [ 177.524421][T10115] do_vfs_ioctl+0xd6e/0x1390 [ 177.534895][T10115] ? ioctl_preallocate+0x210/0x210 [ 177.534911][T10115] ? __fget+0x381/0x550 [ 177.534931][T10115] ? ksys_dup3+0x3e0/0x3e0 [ 177.544622][T10115] ? do_sys_open+0x31d/0x5d0 [ 177.554733][T10115] ? tomoyo_file_ioctl+0x23/0x30 [ 177.554751][T10115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 177.554776][T10115] ? security_file_ioctl+0x93/0xc0 [ 177.563672][T10115] ksys_ioctl+0xab/0xd0 [ 177.572831][T10115] __x64_sys_ioctl+0x73/0xb0 [ 177.572849][T10115] do_syscall_64+0x103/0x610 [ 177.572868][T10115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 177.572880][T10115] RIP: 0033:0x458167 [ 177.572897][T10115] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 177.572904][T10115] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 177.572917][T10115] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458167 [ 177.572925][T10115] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 22:13:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x05', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 177.572933][T10115] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 177.572940][T10115] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 177.572948][T10115] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:28 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x89a1, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:28 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='nt\ns\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x3}], 0x83) [ 177.843502][T10115] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x200000000000000}], 0x83) 22:13:28 executing program 4 (fault-call:0 fault-nth:14): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x4}], 0x83) 22:13:29 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x89a2, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x300000000000000}], 0x83) [ 178.219418][T10160] FAULT_INJECTION: forcing a failure. [ 178.219418][T10160] name failslab, interval 1, probability 0, space 0, times 0 [ 178.273388][T10160] CPU: 1 PID: 10160 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 178.281427][T10160] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 178.291470][T10160] Call Trace: [ 178.294754][T10160] dump_stack+0x172/0x1f0 [ 178.299092][T10160] should_fail.cold+0xa/0x15 [ 178.303696][T10160] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 178.309508][T10160] ? ___might_sleep+0x163/0x280 [ 178.314346][T10160] __should_failslab+0x121/0x190 [ 178.319280][T10160] should_failslab+0x9/0x14 [ 178.323793][T10160] kmem_cache_alloc+0x2b2/0x6f0 [ 178.328647][T10160] ? lock_downgrade+0x880/0x880 [ 178.333483][T10160] ? kasan_check_read+0x11/0x20 [ 178.338326][T10160] __kernfs_new_node+0xef/0x690 [ 178.343241][T10160] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 178.348710][T10160] ? wait_for_completion+0x440/0x440 [ 178.353996][T10160] ? batadv_store_bool_attr.cold+0x3f/0x48 [ 178.359803][T10160] ? mutex_unlock+0xd/0x10 [ 178.364239][T10160] ? kernfs_activate+0x192/0x1f0 [ 178.369180][T10160] kernfs_new_node+0x99/0x130 [ 178.373858][T10160] __kernfs_create_file+0x51/0x340 [ 178.378970][T10160] sysfs_add_file_mode_ns+0x222/0x560 [ 178.384349][T10160] internal_create_group+0x35b/0xc40 [ 178.389626][T10160] ? bd_set_size+0x89/0xb0 [ 178.394031][T10160] ? remove_files.isra.0+0x190/0x190 [ 178.399306][T10160] sysfs_create_group+0x20/0x30 [ 178.404142][T10160] lo_ioctl+0x10af/0x2150 [ 178.408462][T10160] ? lo_rw_aio+0x1120/0x1120 [ 178.413040][T10160] blkdev_ioctl+0x6f2/0x1d10 [ 178.417620][T10160] ? blkpg_ioctl+0xa90/0xa90 [ 178.422204][T10160] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 178.428005][T10160] ? __fget+0x35a/0x550 [ 178.432150][T10160] block_ioctl+0xee/0x130 [ 178.436477][T10160] ? blkdev_fallocate+0x410/0x410 [ 178.441496][T10160] do_vfs_ioctl+0xd6e/0x1390 [ 178.446078][T10160] ? ioctl_preallocate+0x210/0x210 [ 178.451177][T10160] ? __fget+0x381/0x550 [ 178.455339][T10160] ? ksys_dup3+0x3e0/0x3e0 [ 178.459759][T10160] ? do_sys_open+0x31d/0x5d0 [ 178.464350][T10160] ? tomoyo_file_ioctl+0x23/0x30 [ 178.469287][T10160] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 178.475527][T10160] ? security_file_ioctl+0x93/0xc0 [ 178.480642][T10160] ksys_ioctl+0xab/0xd0 [ 178.484894][T10160] __x64_sys_ioctl+0x73/0xb0 [ 178.489490][T10160] do_syscall_64+0x103/0x610 [ 178.494097][T10160] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 178.499988][T10160] RIP: 0033:0x458167 [ 178.503877][T10160] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:13:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x06', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 178.523486][T10160] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 178.531888][T10160] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458167 [ 178.539870][T10160] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 178.547832][T10160] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 178.555792][T10160] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 178.563757][T10160] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x5}], 0x83) [ 178.616023][T10160] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:29 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='nt%s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:29 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x89a3, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x400000000000000}], 0x83) 22:13:29 executing program 4 (fault-call:0 fault-nth:15): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x8}], 0x83) 22:13:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\a', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 178.989736][T10211] FAULT_INJECTION: forcing a failure. [ 178.989736][T10211] name failslab, interval 1, probability 0, space 0, times 0 [ 179.008967][T10211] CPU: 1 PID: 10211 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 179.017005][T10211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.027088][T10211] Call Trace: [ 179.030414][T10211] dump_stack+0x172/0x1f0 [ 179.034781][T10211] should_fail.cold+0xa/0x15 [ 179.039401][T10211] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 179.045326][T10211] ? ___might_sleep+0x163/0x280 [ 179.050208][T10211] __should_failslab+0x121/0x190 [ 179.055170][T10211] should_failslab+0x9/0x14 [ 179.059711][T10211] kmem_cache_alloc+0x2b2/0x6f0 [ 179.064588][T10211] ? lock_downgrade+0x880/0x880 [ 179.069454][T10211] ? kasan_check_read+0x11/0x20 [ 179.074336][T10211] __kernfs_new_node+0xef/0x690 [ 179.079218][T10211] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 179.084710][T10211] ? wait_for_completion+0x440/0x440 [ 179.090024][T10211] ? mutex_unlock+0xd/0x10 [ 179.094465][T10211] ? kernfs_activate+0x192/0x1f0 [ 179.099426][T10211] kernfs_new_node+0x99/0x130 [ 179.104136][T10211] __kernfs_create_file+0x51/0x340 [ 179.109285][T10211] sysfs_add_file_mode_ns+0x222/0x560 [ 179.114710][T10211] internal_create_group+0x35b/0xc40 [ 179.120013][T10211] ? bd_set_size+0x89/0xb0 [ 179.124459][T10211] ? remove_files.isra.0+0x190/0x190 [ 179.129777][T10211] sysfs_create_group+0x20/0x30 [ 179.134652][T10211] lo_ioctl+0x10af/0x2150 [ 179.139007][T10211] ? lo_rw_aio+0x1120/0x1120 [ 179.143624][T10211] blkdev_ioctl+0x6f2/0x1d10 [ 179.148260][T10211] ? blkpg_ioctl+0xa90/0xa90 [ 179.152877][T10211] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 179.158362][T10211] ? retint_kernel+0x2d/0x2d [ 179.162983][T10211] block_ioctl+0xee/0x130 [ 179.167337][T10211] ? blkdev_fallocate+0x410/0x410 [ 179.172382][T10211] do_vfs_ioctl+0xd6e/0x1390 [ 179.177002][T10211] ? ioctl_preallocate+0x210/0x210 [ 179.182132][T10211] ? __fget+0x381/0x550 [ 179.186317][T10211] ? ksys_dup3+0x3e0/0x3e0 [ 179.190759][T10211] ? do_sys_open+0x31d/0x5d0 [ 179.195376][T10211] ? tomoyo_file_ioctl+0x23/0x30 [ 179.200337][T10211] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 179.206625][T10211] ? security_file_ioctl+0x93/0xc0 [ 179.211768][T10211] ksys_ioctl+0xab/0xd0 [ 179.215952][T10211] __x64_sys_ioctl+0x73/0xb0 [ 179.220565][T10211] do_syscall_64+0x103/0x610 [ 179.225185][T10211] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 179.231103][T10211] RIP: 0033:0x458167 [ 179.235017][T10211] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 179.254638][T10211] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 179.263083][T10211] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458167 [ 179.271067][T10211] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 179.279047][T10211] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 22:13:30 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f0000000040)={'syzkaller0\x00'}) [ 179.287032][T10211] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 179.295018][T10211] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 179.311670][T10211] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x500000000000000}], 0x83) 22:13:30 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x40049409, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:30 executing program 4 (fault-call:0 fault-nth:16): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:30 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='nt.s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x11}], 0x83) 22:13:30 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x4020940d, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x1100000000000000}], 0x83) [ 179.780439][T10241] FAULT_INJECTION: forcing a failure. [ 179.780439][T10241] name failslab, interval 1, probability 0, space 0, times 0 [ 179.793923][T10241] CPU: 0 PID: 10241 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 179.801929][T10241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 179.801937][T10241] Call Trace: [ 179.801968][T10241] dump_stack+0x172/0x1f0 [ 179.801989][T10241] should_fail.cold+0xa/0x15 [ 179.802008][T10241] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 179.802031][T10241] ? ___might_sleep+0x163/0x280 [ 179.802052][T10241] __should_failslab+0x121/0x190 [ 179.802067][T10241] should_failslab+0x9/0x14 [ 179.802085][T10241] kmem_cache_alloc+0x2b2/0x6f0 [ 179.802102][T10241] ? lock_downgrade+0x880/0x880 [ 179.802129][T10241] ? kasan_check_read+0x11/0x20 [ 179.859110][T10241] __kernfs_new_node+0xef/0x690 [ 179.863997][T10241] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 179.869566][T10241] ? wait_for_completion+0x440/0x440 [ 179.874878][T10241] ? mutex_unlock+0xd/0x10 [ 179.879308][T10241] ? kernfs_activate+0x192/0x1f0 [ 179.884259][T10241] kernfs_new_node+0x99/0x130 [ 179.888994][T10241] __kernfs_create_file+0x51/0x340 [ 179.894145][T10241] sysfs_add_file_mode_ns+0x222/0x560 [ 179.899540][T10241] internal_create_group+0x35b/0xc40 [ 179.904852][T10241] ? bd_set_size+0x89/0xb0 [ 179.909298][T10241] ? remove_files.isra.0+0x190/0x190 [ 179.914610][T10241] sysfs_create_group+0x20/0x30 [ 179.919478][T10241] lo_ioctl+0x10af/0x2150 [ 179.923831][T10241] ? lo_rw_aio+0x1120/0x1120 [ 179.928448][T10241] blkdev_ioctl+0x6f2/0x1d10 [ 179.933059][T10241] ? blkpg_ioctl+0xa90/0xa90 [ 179.937668][T10241] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 179.943538][T10241] ? __fget+0x35a/0x550 [ 179.947925][T10241] block_ioctl+0xee/0x130 [ 179.952287][T10241] ? blkdev_fallocate+0x410/0x410 [ 179.957531][T10241] do_vfs_ioctl+0xd6e/0x1390 [ 179.962162][T10241] ? ioctl_preallocate+0x210/0x210 [ 179.967777][T10241] ? __fget+0x381/0x550 [ 179.972095][T10241] ? ksys_dup3+0x3e0/0x3e0 [ 179.976574][T10241] ? do_sys_open+0x31d/0x5d0 [ 179.983029][T10241] ? tomoyo_file_ioctl+0x23/0x30 [ 179.988012][T10241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 179.994376][T10241] ? security_file_ioctl+0x93/0xc0 [ 179.999522][T10241] ksys_ioctl+0xab/0xd0 [ 180.003727][T10241] __x64_sys_ioctl+0x73/0xb0 [ 180.008453][T10241] do_syscall_64+0x103/0x610 [ 180.013124][T10241] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.019066][T10241] RIP: 0033:0x458167 [ 180.022983][T10241] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 180.042807][T10241] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 180.051250][T10241] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458167 [ 180.059244][T10241] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 180.067239][T10241] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 180.075232][T10241] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 180.083227][T10241] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:31 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0xc0045878, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\n', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 180.153004][T10241] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:31 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x12}], 0x83) 22:13:31 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0xc0045878, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x1200000000000000}], 0x83) 22:13:31 executing program 4 (fault-call:0 fault-nth:17): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:31 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:31 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='nt/s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:31 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x14}], 0x83) [ 180.555792][T10285] FAULT_INJECTION: forcing a failure. [ 180.555792][T10285] name failslab, interval 1, probability 0, space 0, times 0 [ 180.599097][T10285] CPU: 1 PID: 10285 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 180.607151][T10285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 180.617241][T10285] Call Trace: [ 180.620538][T10285] dump_stack+0x172/0x1f0 [ 180.624882][T10285] should_fail.cold+0xa/0x15 [ 180.629492][T10285] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 180.635316][T10285] ? ___might_sleep+0x163/0x280 [ 180.640179][T10285] __should_failslab+0x121/0x190 [ 180.645140][T10285] should_failslab+0x9/0x14 [ 180.649656][T10285] kmem_cache_alloc_trace+0x2d1/0x760 [ 180.655051][T10285] kobject_uevent_env+0x2fb/0x1030 [ 180.660180][T10285] kobject_uevent+0x20/0x26 [ 180.664702][T10285] lo_ioctl+0x112b/0x2150 [ 180.669050][T10285] ? lo_rw_aio+0x1120/0x1120 [ 180.673656][T10285] blkdev_ioctl+0x6f2/0x1d10 [ 180.678255][T10285] ? blkpg_ioctl+0xa90/0xa90 [ 180.682851][T10285] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 180.688673][T10285] ? __fget+0x35a/0x550 [ 180.692842][T10285] block_ioctl+0xee/0x130 [ 180.697204][T10285] ? blkdev_fallocate+0x410/0x410 [ 180.702241][T10285] do_vfs_ioctl+0xd6e/0x1390 [ 180.706843][T10285] ? ioctl_preallocate+0x210/0x210 [ 180.713808][T10285] ? __fget+0x381/0x550 [ 180.719548][T10285] ? ksys_dup3+0x3e0/0x3e0 [ 180.723984][T10285] ? do_sys_open+0x31d/0x5d0 [ 180.728589][T10285] ? tomoyo_file_ioctl+0x23/0x30 [ 180.733534][T10285] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 180.739784][T10285] ? security_file_ioctl+0x93/0xc0 [ 180.744887][T10285] ksys_ioctl+0xab/0xd0 [ 180.749036][T10285] __x64_sys_ioctl+0x73/0xb0 [ 180.753634][T10285] do_syscall_64+0x103/0x610 [ 180.758235][T10285] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 180.764136][T10285] RIP: 0033:0x458167 [ 180.768035][T10285] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 180.787629][T10285] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:13:31 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0xc020660b, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x1400000000000000}], 0x83) [ 180.796046][T10285] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458167 [ 180.804008][T10285] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 180.811971][T10285] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 180.819931][T10285] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 180.827894][T10285] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 180.923285][T10285] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:31 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'#yzkaller0\x00'}) 22:13:31 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x15}], 0x83) 22:13:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x0e', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:31 executing program 4 (fault-call:0 fault-nth:18): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 181.169335][T10323] FAULT_INJECTION: forcing a failure. [ 181.169335][T10323] name failslab, interval 1, probability 0, space 0, times 0 [ 181.199819][T10323] CPU: 0 PID: 10323 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 181.207855][T10323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.217914][T10323] Call Trace: [ 181.221237][T10323] dump_stack+0x172/0x1f0 [ 181.225573][T10323] should_fail.cold+0xa/0x15 [ 181.230148][T10323] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 181.235971][T10323] ? ___might_sleep+0x163/0x280 [ 181.240852][T10323] __should_failslab+0x121/0x190 [ 181.245790][T10323] should_failslab+0x9/0x14 [ 181.250282][T10323] kmem_cache_alloc_trace+0x2d1/0x760 [ 181.255672][T10323] kobject_uevent_env+0x2fb/0x1030 [ 181.260801][T10323] kobject_uevent+0x20/0x26 [ 181.265321][T10323] lo_ioctl+0x112b/0x2150 22:13:32 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'%yzkaller0\x00'}) [ 181.269667][T10323] ? lo_rw_aio+0x1120/0x1120 [ 181.274384][T10323] blkdev_ioctl+0x6f2/0x1d10 [ 181.278992][T10323] ? blkpg_ioctl+0xa90/0xa90 [ 181.283619][T10323] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 181.289424][T10323] ? __fget+0x35a/0x550 [ 181.293586][T10323] block_ioctl+0xee/0x130 [ 181.297920][T10323] ? blkdev_fallocate+0x410/0x410 [ 181.302943][T10323] do_vfs_ioctl+0xd6e/0x1390 [ 181.307539][T10323] ? ioctl_preallocate+0x210/0x210 [ 181.312664][T10323] ? __fget+0x381/0x550 [ 181.316834][T10323] ? ksys_dup3+0x3e0/0x3e0 [ 181.321247][T10323] ? do_sys_open+0x31d/0x5d0 [ 181.325907][T10323] ? tomoyo_file_ioctl+0x23/0x30 [ 181.330842][T10323] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 181.337099][T10323] ? security_file_ioctl+0x93/0xc0 [ 181.342253][T10323] ksys_ioctl+0xab/0xd0 [ 181.346456][T10323] __x64_sys_ioctl+0x73/0xb0 [ 181.351269][T10323] do_syscall_64+0x103/0x610 [ 181.355928][T10323] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 181.362068][T10323] RIP: 0033:0x458167 [ 181.366622][T10323] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 181.392044][T10323] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 181.402882][T10323] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458167 22:13:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x1500000000000000}], 0x83) [ 181.414655][T10323] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 181.422963][T10323] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 181.434074][T10323] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 181.442182][T10323] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 181.482038][T10323] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:32 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x16}], 0x83) 22:13:32 executing program 4 (fault-call:0 fault-nth:19): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x10', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:32 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntf\n\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:32 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'*yzkaller0\x00'}) 22:13:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x1600000000000000}], 0x83) 22:13:32 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x300}], 0x83) [ 181.885114][T10350] FAULT_INJECTION: forcing a failure. [ 181.885114][T10350] name failslab, interval 1, probability 0, space 0, times 0 [ 181.910981][T10350] CPU: 0 PID: 10350 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 181.919013][T10350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 181.929107][T10350] Call Trace: [ 181.932421][T10350] dump_stack+0x172/0x1f0 [ 181.936777][T10350] should_fail.cold+0xa/0x15 [ 181.941390][T10350] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 181.947237][T10350] ? ___might_sleep+0x163/0x280 [ 181.952118][T10350] __should_failslab+0x121/0x190 [ 181.957101][T10350] should_failslab+0x9/0x14 [ 181.961629][T10350] kmem_cache_alloc+0x2b2/0x6f0 [ 181.966482][T10350] ? lock_downgrade+0x880/0x880 [ 181.971339][T10350] ? kasan_check_read+0x11/0x20 [ 181.976228][T10350] __kernfs_new_node+0xef/0x690 [ 181.981102][T10350] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 181.986561][T10350] ? wait_for_completion+0x440/0x440 [ 181.991871][T10350] ? mutex_unlock+0xd/0x10 [ 181.996297][T10350] ? kernfs_activate+0x192/0x1f0 [ 182.001247][T10350] kernfs_new_node+0x99/0x130 [ 182.005931][T10350] __kernfs_create_file+0x51/0x340 [ 182.011091][T10350] sysfs_add_file_mode_ns+0x222/0x560 [ 182.016511][T10350] internal_create_group+0x35b/0xc40 [ 182.021810][T10350] ? bd_set_size+0x89/0xb0 [ 182.026251][T10350] ? remove_files.isra.0+0x190/0x190 [ 182.031559][T10350] sysfs_create_group+0x20/0x30 [ 182.036415][T10350] lo_ioctl+0x10af/0x2150 [ 182.040752][T10350] ? lo_rw_aio+0x1120/0x1120 [ 182.045347][T10350] blkdev_ioctl+0x6f2/0x1d10 [ 182.049945][T10350] ? blkpg_ioctl+0xa90/0xa90 [ 182.054538][T10350] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 182.060361][T10350] ? __fget+0x35a/0x550 [ 182.064524][T10350] block_ioctl+0xee/0x130 [ 182.068857][T10350] ? blkdev_fallocate+0x410/0x410 [ 182.073909][T10350] do_vfs_ioctl+0xd6e/0x1390 [ 182.078498][T10350] ? ioctl_preallocate+0x210/0x210 [ 182.083607][T10350] ? __fget+0x381/0x550 [ 182.087779][T10350] ? ksys_dup3+0x3e0/0x3e0 [ 182.092219][T10350] ? do_sys_open+0x31d/0x5d0 [ 182.096835][T10350] ? tomoyo_file_ioctl+0x23/0x30 [ 182.101797][T10350] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 182.108048][T10350] ? security_file_ioctl+0x93/0xc0 [ 182.113172][T10350] ksys_ioctl+0xab/0xd0 [ 182.117331][T10350] __x64_sys_ioctl+0x73/0xb0 [ 182.121919][T10350] do_syscall_64+0x103/0x610 [ 182.126508][T10350] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.132408][T10350] RIP: 0033:0x458167 [ 182.136322][T10350] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 182.156049][T10350] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 182.165094][T10350] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458167 [ 182.173397][T10350] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 22:13:33 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'+yzkaller0\x00'}) [ 182.182017][T10350] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 182.189992][T10350] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 182.197969][T10350] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 182.235090][T10350] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:33 executing program 4 (fault-call:0 fault-nth:20): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:33 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x1f00000000000000}], 0x83) 22:13:33 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'-yzkaller0\x00'}) 22:13:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x500}], 0x83) 22:13:33 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntf#\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 182.491251][T10392] FAULT_INJECTION: forcing a failure. [ 182.491251][T10392] name failslab, interval 1, probability 0, space 0, times 0 [ 182.521584][T10392] CPU: 1 PID: 10392 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 182.529621][T10392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 22:13:33 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'.yzkaller0\x00'}) [ 182.539676][T10392] Call Trace: [ 182.542999][T10392] dump_stack+0x172/0x1f0 [ 182.547360][T10392] should_fail.cold+0xa/0x15 [ 182.551971][T10392] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 182.557782][T10392] ? ___might_sleep+0x163/0x280 [ 182.562646][T10392] __should_failslab+0x121/0x190 [ 182.567736][T10392] should_failslab+0x9/0x14 [ 182.572249][T10392] kmem_cache_alloc_node+0x264/0x710 [ 182.577536][T10392] ? find_held_lock+0x35/0x130 [ 182.582333][T10392] __alloc_skb+0xd5/0x5e0 [ 182.586667][T10392] ? skb_trim+0x190/0x190 [ 182.591000][T10392] ? kasan_check_read+0x11/0x20 [ 182.595855][T10392] alloc_uevent_skb+0x83/0x1e2 [ 182.600624][T10392] kobject_uevent_env+0xa63/0x1030 [ 182.605744][T10392] kobject_uevent+0x20/0x26 [ 182.610321][T10392] lo_ioctl+0x112b/0x2150 [ 182.614653][T10392] ? lo_rw_aio+0x1120/0x1120 [ 182.619244][T10392] blkdev_ioctl+0x6f2/0x1d10 [ 182.623835][T10392] ? blkpg_ioctl+0xa90/0xa90 [ 182.628423][T10392] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 182.634250][T10392] ? __fget+0x35a/0x550 [ 182.638410][T10392] block_ioctl+0xee/0x130 [ 182.642749][T10392] ? blkdev_fallocate+0x410/0x410 [ 182.647773][T10392] do_vfs_ioctl+0xd6e/0x1390 [ 182.652384][T10392] ? ioctl_preallocate+0x210/0x210 [ 182.657494][T10392] ? __fget+0x381/0x550 [ 182.661656][T10392] ? ksys_dup3+0x3e0/0x3e0 [ 182.666084][T10392] ? do_sys_open+0x31d/0x5d0 [ 182.670673][T10392] ? tomoyo_file_ioctl+0x23/0x30 [ 182.675622][T10392] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 182.681877][T10392] ? security_file_ioctl+0x93/0xc0 [ 182.686997][T10392] ksys_ioctl+0xab/0xd0 [ 182.691258][T10392] __x64_sys_ioctl+0x73/0xb0 [ 182.696814][T10392] do_syscall_64+0x103/0x610 [ 182.702458][T10392] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 182.708967][T10392] RIP: 0033:0x458167 [ 182.721041][T10392] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 182.745403][T10392] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 182.754403][T10392] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458167 [ 182.765729][T10392] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 182.775523][T10392] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 182.785851][T10392] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 182.794335][T10392] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 182.811778][T10392] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfsH', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:33 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x3f00000000000000}], 0x83) 22:13:33 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'0yzkaller0\x00'}) 22:13:33 executing program 4 (fault-call:0 fault-nth:21): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x1100}], 0x83) 22:13:34 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'Xyzkaller0\x00'}) 22:13:34 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntf%\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0xfa00000000000000}], 0x83) [ 183.232690][T10438] FAULT_INJECTION: forcing a failure. [ 183.232690][T10438] name failslab, interval 1, probability 0, space 0, times 0 [ 183.248519][T10438] CPU: 0 PID: 10438 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 183.256539][T10438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.266620][T10438] Call Trace: [ 183.269935][T10438] dump_stack+0x172/0x1f0 [ 183.274288][T10438] should_fail.cold+0xa/0x15 22:13:34 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'cyzkaller0\x00'}) [ 183.278901][T10438] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 183.284738][T10438] ? ___might_sleep+0x163/0x280 [ 183.289633][T10438] __should_failslab+0x121/0x190 [ 183.294590][T10438] should_failslab+0x9/0x14 [ 183.299107][T10438] kmem_cache_alloc+0x2b2/0x6f0 [ 183.303966][T10438] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 183.309781][T10438] ? lock_downgrade+0x880/0x880 [ 183.314655][T10438] skb_clone+0x150/0x3b0 [ 183.318901][T10438] netlink_broadcast_filtered+0x870/0xb20 [ 183.324678][T10438] netlink_broadcast+0x3a/0x50 [ 183.329458][T10438] kobject_uevent_env+0xa94/0x1030 [ 183.334596][T10438] kobject_uevent+0x20/0x26 [ 183.339119][T10438] lo_ioctl+0x112b/0x2150 [ 183.343465][T10438] ? lo_rw_aio+0x1120/0x1120 [ 183.348070][T10438] blkdev_ioctl+0x6f2/0x1d10 [ 183.352672][T10438] ? blkpg_ioctl+0xa90/0xa90 [ 183.357269][T10438] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 183.363076][T10438] ? __fget+0x35a/0x550 [ 183.367241][T10438] block_ioctl+0xee/0x130 [ 183.371595][T10438] ? blkdev_fallocate+0x410/0x410 [ 183.376631][T10438] do_vfs_ioctl+0xd6e/0x1390 [ 183.381276][T10438] ? ioctl_preallocate+0x210/0x210 [ 183.386417][T10438] ? __fget+0x381/0x550 [ 183.390587][T10438] ? ksys_dup3+0x3e0/0x3e0 [ 183.395007][T10438] ? do_sys_open+0x31d/0x5d0 [ 183.399595][T10438] ? tomoyo_file_ioctl+0x23/0x30 [ 183.404526][T10438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 183.410775][T10438] ? security_file_ioctl+0x93/0xc0 [ 183.415894][T10438] ksys_ioctl+0xab/0xd0 [ 183.420047][T10438] __x64_sys_ioctl+0x73/0xb0 [ 183.424632][T10438] do_syscall_64+0x103/0x610 [ 183.429246][T10438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 183.435152][T10438] RIP: 0033:0x458167 [ 183.439062][T10438] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 183.458686][T10438] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 183.467106][T10438] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458167 [ 183.475098][T10438] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 183.483064][T10438] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 183.491038][T10438] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 183.499015][T10438] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 183.568526][T10438] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:34 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x1200}], 0x83) 22:13:34 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfsL', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:34 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'dyzkaller0\x00'}) 22:13:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x2}], 0x83) 22:13:34 executing program 4 (fault-call:0 fault-nth:22): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 183.908342][T10467] FAULT_INJECTION: forcing a failure. [ 183.908342][T10467] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 183.921610][T10467] CPU: 1 PID: 10467 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 183.921621][T10467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 183.921626][T10467] Call Trace: [ 183.921655][T10467] dump_stack+0x172/0x1f0 [ 183.921678][T10467] should_fail.cold+0xa/0x15 [ 183.921704][T10467] ? lo_ioctl+0xcf/0x2150 [ 183.939799][T10467] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 183.939816][T10467] ? __lock_acquire+0x548/0x3fb0 [ 183.939838][T10467] should_fail_alloc_page+0x50/0x60 [ 183.939853][T10467] __alloc_pages_nodemask+0x1a1/0x7e0 [ 183.939870][T10467] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 183.939882][T10467] ? find_held_lock+0x35/0x130 [ 183.939899][T10467] ? __fget+0x35a/0x550 [ 183.939920][T10467] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 183.998461][T10467] cache_grow_begin+0x9c/0x860 [ 184.003253][T10467] ? getname_flags+0xd6/0x5b0 [ 184.007953][T10467] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 184.014239][T10467] kmem_cache_alloc+0x62d/0x6f0 [ 184.019112][T10467] ? __fget+0x381/0x550 [ 184.023297][T10467] getname_flags+0xd6/0x5b0 [ 184.027826][T10467] do_mkdirat+0xa0/0x2a0 [ 184.032184][T10467] ? __ia32_sys_mknod+0xb0/0xb0 [ 184.037066][T10467] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 184.042557][T10467] ? do_syscall_64+0x26/0x610 [ 184.047259][T10467] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.053344][T10467] ? do_syscall_64+0x26/0x610 [ 184.058042][T10467] ? lockdep_hardirqs_on+0x418/0x5d0 [ 184.063351][T10467] __x64_sys_mkdir+0x5c/0x80 [ 184.067988][T10467] do_syscall_64+0x103/0x610 [ 184.072610][T10467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.078518][T10467] RIP: 0033:0x457717 [ 184.082429][T10467] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:13:35 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x1400}], 0x83) [ 184.102050][T10467] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 184.110480][T10467] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457717 [ 184.118467][T10467] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000140 [ 184.126453][T10467] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 184.134442][T10467] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 184.142429][T10467] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntf*\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:35 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'iyzkaller0\x00'}) [ 184.205851][T10467] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x3}], 0x83) 22:13:35 executing program 4 (fault-call:0 fault-nth:23): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:35 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfsh', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:35 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x1500}], 0x83) 22:13:35 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lyzkaller0\x00'}) 22:13:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x4}], 0x83) [ 184.539281][T10496] FAULT_INJECTION: forcing a failure. [ 184.539281][T10496] name failslab, interval 1, probability 0, space 0, times 0 [ 184.569217][T10496] CPU: 1 PID: 10496 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 184.577250][T10496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 184.587320][T10496] Call Trace: [ 184.590641][T10496] dump_stack+0x172/0x1f0 [ 184.595003][T10496] should_fail.cold+0xa/0x15 [ 184.599626][T10496] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 184.605457][T10496] ? ___might_sleep+0x163/0x280 [ 184.610333][T10496] __should_failslab+0x121/0x190 [ 184.615295][T10496] should_failslab+0x9/0x14 [ 184.619823][T10496] kmem_cache_alloc_node_trace+0x270/0x720 [ 184.625673][T10496] __kmalloc_node_track_caller+0x3d/0x70 [ 184.631401][T10496] __kmalloc_reserve.isra.0+0x40/0xf0 [ 184.637108][T10496] __alloc_skb+0x10b/0x5e0 [ 184.641569][T10496] ? skb_trim+0x190/0x190 [ 184.645963][T10496] ? kasan_check_read+0x11/0x20 [ 184.650874][T10496] alloc_uevent_skb+0x83/0x1e2 [ 184.655689][T10496] kobject_uevent_env+0xa63/0x1030 [ 184.661047][T10496] kobject_uevent+0x20/0x26 [ 184.665609][T10496] lo_ioctl+0x112b/0x2150 [ 184.669998][T10496] ? lo_rw_aio+0x1120/0x1120 [ 184.674716][T10496] blkdev_ioctl+0x6f2/0x1d10 [ 184.679386][T10496] ? blkpg_ioctl+0xa90/0xa90 [ 184.684006][T10496] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 184.690585][T10496] ? __fget+0x35a/0x550 [ 184.694789][T10496] block_ioctl+0xee/0x130 [ 184.699153][T10496] ? blkdev_fallocate+0x410/0x410 [ 184.704429][T10496] do_vfs_ioctl+0xd6e/0x1390 [ 184.709276][T10496] ? ioctl_preallocate+0x210/0x210 [ 184.715210][T10496] ? __fget+0x381/0x550 [ 184.725658][T10496] ? ksys_dup3+0x3e0/0x3e0 [ 184.730146][T10496] ? do_sys_open+0x31d/0x5d0 [ 184.734783][T10496] ? tomoyo_file_ioctl+0x23/0x30 [ 184.739784][T10496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 184.746193][T10496] ? security_file_ioctl+0x93/0xc0 [ 184.752075][T10496] ksys_ioctl+0xab/0xd0 [ 184.756394][T10496] __x64_sys_ioctl+0x73/0xb0 [ 184.761159][T10496] do_syscall_64+0x103/0x610 [ 184.765792][T10496] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 184.772318][T10496] RIP: 0033:0x458167 [ 184.776251][T10496] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 184.797517][T10496] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 184.805943][T10496] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000458167 [ 184.813928][T10496] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 184.821911][T10496] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 184.829899][T10496] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 22:13:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntf+\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 184.837895][T10496] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 184.861275][T10496] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:35 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x1600}], 0x83) 22:13:35 executing program 4 (fault-call:0 fault-nth:24): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:35 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'oyzkaller0\x00'}) 22:13:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x5}], 0x83) 22:13:36 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'pyzkaller0\x00'}) [ 185.144743][T10521] FAULT_INJECTION: forcing a failure. [ 185.144743][T10521] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 185.158002][T10521] CPU: 1 PID: 10521 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 185.165992][T10521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.176061][T10521] Call Trace: [ 185.179487][T10521] dump_stack+0x172/0x1f0 [ 185.183857][T10521] should_fail.cold+0xa/0x15 [ 185.188472][T10521] ? lo_ioctl+0xcf/0x2150 [ 185.192839][T10521] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 185.198673][T10521] ? __lock_acquire+0x548/0x3fb0 [ 185.203653][T10521] should_fail_alloc_page+0x50/0x60 [ 185.208882][T10521] __alloc_pages_nodemask+0x1a1/0x7e0 [ 185.214290][T10521] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 185.220032][T10521] ? find_held_lock+0x35/0x130 [ 185.224829][T10521] ? __fget+0x35a/0x550 [ 185.229010][T10521] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 185.234846][T10521] cache_grow_begin+0x9c/0x860 [ 185.239639][T10521] ? getname_flags+0xd6/0x5b0 [ 185.244344][T10521] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 185.250615][T10521] kmem_cache_alloc+0x62d/0x6f0 [ 185.255488][T10521] ? __fget+0x381/0x550 [ 185.259677][T10521] getname_flags+0xd6/0x5b0 [ 185.264224][T10521] do_mkdirat+0xa0/0x2a0 [ 185.268494][T10521] ? __ia32_sys_mknod+0xb0/0xb0 [ 185.273367][T10521] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 185.278847][T10521] ? do_syscall_64+0x26/0x610 [ 185.283554][T10521] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.289644][T10521] ? do_syscall_64+0x26/0x610 [ 185.294347][T10521] ? lockdep_hardirqs_on+0x418/0x5d0 [ 185.299661][T10521] __x64_sys_mkdir+0x5c/0x80 [ 185.304286][T10521] do_syscall_64+0x103/0x610 [ 185.308907][T10521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.314819][T10521] RIP: 0033:0x457717 [ 185.318740][T10521] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.338356][T10521] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 185.346784][T10521] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457717 [ 185.354771][T10521] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000140 [ 185.362760][T10521] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 185.370749][T10521] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 185.378737][T10521] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:36 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfsl', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntf-\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:36 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x1f00}], 0x83) [ 185.392642][T10521] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:36 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'uyzkaller0\x00'}) 22:13:36 executing program 4 (fault-call:0 fault-nth:25): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:36 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x11}], 0x83) 22:13:36 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'xyzkaller0\x00'}) [ 185.652515][T10547] FAULT_INJECTION: forcing a failure. [ 185.652515][T10547] name failslab, interval 1, probability 0, space 0, times 0 [ 185.692376][T10547] CPU: 1 PID: 10547 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 185.700427][T10547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 185.710500][T10547] Call Trace: [ 185.713827][T10547] dump_stack+0x172/0x1f0 [ 185.718209][T10547] should_fail.cold+0xa/0x15 [ 185.722838][T10547] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 185.728672][T10547] ? ___might_sleep+0x163/0x280 [ 185.733559][T10547] __should_failslab+0x121/0x190 [ 185.738531][T10547] ? ratelimit_state_init+0xb0/0xb0 [ 185.743758][T10547] should_failslab+0x9/0x14 [ 185.748295][T10547] kmem_cache_alloc+0x2b2/0x6f0 [ 185.753176][T10547] ? __save_stack_trace+0x99/0x100 [ 185.759556][T10547] ? ratelimit_state_init+0xb0/0xb0 [ 185.764782][T10547] ext4_alloc_inode+0x1f/0x640 [ 185.769578][T10547] ? ratelimit_state_init+0xb0/0xb0 [ 185.774797][T10547] alloc_inode+0x66/0x190 [ 185.779162][T10547] new_inode_pseudo+0x19/0xf0 [ 185.783886][T10547] new_inode+0x1f/0x40 [ 185.787987][T10547] __ext4_new_inode+0x37e/0x5450 [ 185.792959][T10547] ? debug_check_no_obj_freed+0x200/0x464 [ 185.798725][T10547] ? ext4_free_inode+0x1450/0x1450 [ 185.803871][T10547] ? dqget+0x10d0/0x10d0 [ 185.808154][T10547] ext4_mkdir+0x3d5/0xdf0 [ 185.812530][T10547] ? ext4_init_dot_dotdot+0x520/0x520 [ 185.817922][T10547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 185.824184][T10547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 185.830755][T10547] ? security_inode_permission+0xd5/0x110 [ 185.836528][T10547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 185.842794][T10547] ? security_inode_mkdir+0xee/0x120 [ 185.848110][T10547] vfs_mkdir+0x433/0x690 [ 185.852380][T10547] do_mkdirat+0x234/0x2a0 [ 185.856742][T10547] ? __ia32_sys_mknod+0xb0/0xb0 [ 185.861615][T10547] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 185.867104][T10547] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.873202][T10547] ? do_syscall_64+0x26/0x610 [ 185.877909][T10547] ? lockdep_hardirqs_on+0x418/0x5d0 [ 185.883258][T10547] __x64_sys_mkdir+0x5c/0x80 [ 185.887878][T10547] do_syscall_64+0x103/0x610 [ 185.892499][T10547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 185.898415][T10547] RIP: 0033:0x457717 [ 185.902326][T10547] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 185.921945][T10547] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 185.930373][T10547] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457717 [ 185.938359][T10547] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000140 [ 185.946348][T10547] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 22:13:36 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x1000000}], 0x83) [ 185.954336][T10547] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 185.962321][T10547] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntf.\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:36 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfst', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:36 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x12}], 0x83) 22:13:36 executing program 4 (fault-call:0 fault-nth:26): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:37 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkall%r0\x00'}) 22:13:37 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x2000000}], 0x83) [ 186.226891][T10571] FAULT_INJECTION: forcing a failure. [ 186.226891][T10571] name failslab, interval 1, probability 0, space 0, times 0 [ 186.263763][T10571] CPU: 1 PID: 10571 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 186.271808][T10571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.281879][T10571] Call Trace: [ 186.285192][T10571] dump_stack+0x172/0x1f0 [ 186.289571][T10571] should_fail.cold+0xa/0x15 [ 186.294182][T10571] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 186.300023][T10571] ? ___might_sleep+0x163/0x280 [ 186.304898][T10571] __should_failslab+0x121/0x190 [ 186.309862][T10571] ? ratelimit_state_init+0xb0/0xb0 [ 186.315080][T10571] should_failslab+0x9/0x14 [ 186.319598][T10571] kmem_cache_alloc+0x2b2/0x6f0 [ 186.324468][T10571] ? __save_stack_trace+0x99/0x100 [ 186.329600][T10571] ? ratelimit_state_init+0xb0/0xb0 [ 186.334909][T10571] ext4_alloc_inode+0x1f/0x640 [ 186.339692][T10571] ? ratelimit_state_init+0xb0/0xb0 [ 186.344925][T10571] alloc_inode+0x66/0x190 [ 186.349280][T10571] new_inode_pseudo+0x19/0xf0 [ 186.353981][T10571] new_inode+0x1f/0x40 [ 186.358069][T10571] __ext4_new_inode+0x37e/0x5450 [ 186.363038][T10571] ? debug_check_no_obj_freed+0x200/0x464 [ 186.368789][T10571] ? ext4_free_inode+0x1450/0x1450 [ 186.373934][T10571] ? dqget+0x10d0/0x10d0 [ 186.378223][T10571] ext4_mkdir+0x3d5/0xdf0 [ 186.382591][T10571] ? ext4_init_dot_dotdot+0x520/0x520 [ 186.387986][T10571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.394259][T10571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.400524][T10571] ? security_inode_permission+0xd5/0x110 [ 186.406271][T10571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 186.412540][T10571] ? security_inode_mkdir+0xee/0x120 [ 186.417847][T10571] vfs_mkdir+0x433/0x690 [ 186.422125][T10571] do_mkdirat+0x234/0x2a0 [ 186.426475][T10571] ? __ia32_sys_mknod+0xb0/0xb0 [ 186.431347][T10571] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 186.436829][T10571] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.442919][T10571] ? do_syscall_64+0x26/0x610 [ 186.447622][T10571] ? lockdep_hardirqs_on+0x418/0x5d0 [ 186.452931][T10571] __x64_sys_mkdir+0x5c/0x80 [ 186.457550][T10571] do_syscall_64+0x103/0x610 [ 186.462173][T10571] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 186.468096][T10571] RIP: 0033:0x457717 [ 186.472012][T10571] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 186.491627][T10571] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 186.500057][T10571] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457717 [ 186.508043][T10571] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000140 [ 186.516032][T10571] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 186.524022][T10571] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 186.532012][T10571] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:37 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x02\x00'}) 22:13:37 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x14}], 0x83) 22:13:37 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x3000000}], 0x83) 22:13:37 executing program 4 (fault-call:0 fault-nth:27): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:37 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntf0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:37 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x15}], 0x83) 22:13:37 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfsz', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:37 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x4000000}], 0x83) 22:13:37 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x03\x00'}) [ 186.843025][T10592] FAULT_INJECTION: forcing a failure. [ 186.843025][T10592] name failslab, interval 1, probability 0, space 0, times 0 [ 186.873582][T10592] CPU: 1 PID: 10592 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 186.881614][T10592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.892618][T10592] Call Trace: [ 186.895932][T10592] dump_stack+0x172/0x1f0 [ 186.900289][T10592] should_fail.cold+0xa/0x15 [ 186.904900][T10592] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 186.910731][T10592] ? ___might_sleep+0x163/0x280 [ 186.915599][T10592] __should_failslab+0x121/0x190 [ 186.920552][T10592] should_failslab+0x9/0x14 [ 186.925069][T10592] __kmalloc+0x2dc/0x740 [ 186.929327][T10592] ? ext4_find_extent+0x76e/0x9d0 [ 186.934380][T10592] ext4_find_extent+0x76e/0x9d0 [ 186.939265][T10592] ext4_ext_map_blocks+0x1cc/0x5300 [ 186.944497][T10592] ? ext4_ext_release+0x10/0x10 [ 186.949380][T10592] ? lock_acquire+0x16f/0x3f0 [ 186.954068][T10592] ? ext4_map_blocks+0x3fd/0x18e0 [ 186.959118][T10592] ext4_map_blocks+0xec7/0x18e0 [ 186.964018][T10592] ? ext4_issue_zeroout+0x190/0x190 [ 186.969243][T10592] ? kasan_check_write+0x14/0x20 [ 186.974203][T10592] ? __brelse+0x95/0xb0 [ 186.978377][T10592] ext4_getblk+0xc4/0x510 [ 186.982733][T10592] ? ext4_iomap_begin+0xfe0/0xfe0 [ 186.987777][T10592] ? ext4_free_inode+0x1450/0x1450 [ 186.992904][T10592] ext4_bread+0x8f/0x230 [ 186.997166][T10592] ? ext4_getblk+0x510/0x510 [ 187.001790][T10592] ext4_append+0x155/0x370 [ 187.006229][T10592] ext4_mkdir+0x61b/0xdf0 [ 187.010580][T10592] ? ext4_init_dot_dotdot+0x520/0x520 [ 187.015967][T10592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.022227][T10592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.028490][T10592] ? security_inode_permission+0xd5/0x110 [ 187.034236][T10592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.040497][T10592] ? security_inode_mkdir+0xee/0x120 [ 187.045799][T10592] vfs_mkdir+0x433/0x690 [ 187.050064][T10592] do_mkdirat+0x234/0x2a0 [ 187.054414][T10592] ? __ia32_sys_mknod+0xb0/0xb0 [ 187.059276][T10592] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 187.064750][T10592] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.070827][T10592] ? do_syscall_64+0x26/0x610 [ 187.075514][T10592] ? lockdep_hardirqs_on+0x418/0x5d0 [ 187.080840][T10592] __x64_sys_mkdir+0x5c/0x80 [ 187.086574][T10592] do_syscall_64+0x103/0x610 [ 187.091382][T10592] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.097395][T10592] RIP: 0033:0x457717 [ 187.101610][T10592] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.121253][T10592] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 187.129714][T10592] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457717 [ 187.137747][T10592] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000140 [ 187.145864][T10592] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 187.153997][T10592] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 187.162138][T10592] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:38 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x04\x00'}) [ 187.221061][T10592] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x16}], 0x83) 22:13:38 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfX\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:38 executing program 4 (fault-call:0 fault-nth:28): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:38 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x05\x00'}) 22:13:38 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x5000000}], 0x83) 22:13:38 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 187.510025][T10625] FAULT_INJECTION: forcing a failure. [ 187.510025][T10625] name failslab, interval 1, probability 0, space 0, times 0 [ 187.538929][T10625] CPU: 0 PID: 10625 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 187.546954][T10625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.557015][T10625] Call Trace: [ 187.560323][T10625] dump_stack+0x172/0x1f0 [ 187.564668][T10625] should_fail.cold+0xa/0x15 [ 187.569270][T10625] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 187.575094][T10625] ? ___might_sleep+0x163/0x280 [ 187.579954][T10625] __should_failslab+0x121/0x190 [ 187.584902][T10625] should_failslab+0x9/0x14 [ 187.589409][T10625] __kmalloc+0x2dc/0x740 [ 187.593669][T10625] ? ext4_find_extent+0x76e/0x9d0 [ 187.598705][T10625] ext4_find_extent+0x76e/0x9d0 [ 187.603575][T10625] ext4_ext_map_blocks+0x1cc/0x5300 [ 187.608789][T10625] ? ext4_ext_release+0x10/0x10 [ 187.613661][T10625] ? lock_acquire+0x16f/0x3f0 [ 187.618344][T10625] ? ext4_map_blocks+0x3fd/0x18e0 [ 187.623383][T10625] ext4_map_blocks+0xec7/0x18e0 [ 187.628254][T10625] ? ext4_issue_zeroout+0x190/0x190 [ 187.633471][T10625] ? kasan_check_write+0x14/0x20 [ 187.638411][T10625] ? __brelse+0x95/0xb0 [ 187.642576][T10625] ext4_getblk+0xc4/0x510 [ 187.646917][T10625] ? ext4_iomap_begin+0xfe0/0xfe0 [ 187.651952][T10625] ? ext4_free_inode+0x1450/0x1450 [ 187.657074][T10625] ext4_bread+0x8f/0x230 [ 187.661323][T10625] ? ext4_getblk+0x510/0x510 [ 187.665921][T10625] ext4_append+0x155/0x370 [ 187.670353][T10625] ext4_mkdir+0x61b/0xdf0 [ 187.674694][T10625] ? ext4_init_dot_dotdot+0x520/0x520 [ 187.674766][T10625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.674786][T10625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.692633][T10625] ? security_inode_permission+0xd5/0x110 [ 187.698363][T10625] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 187.704643][T10625] ? security_inode_mkdir+0xee/0x120 [ 187.709940][T10625] vfs_mkdir+0x433/0x690 [ 187.714214][T10625] do_mkdirat+0x234/0x2a0 [ 187.718563][T10625] ? __ia32_sys_mknod+0xb0/0xb0 [ 187.723438][T10625] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 187.728915][T10625] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.734992][T10625] ? do_syscall_64+0x26/0x610 [ 187.739680][T10625] ? lockdep_hardirqs_on+0x418/0x5d0 [ 187.744975][T10625] __x64_sys_mkdir+0x5c/0x80 [ 187.749581][T10625] do_syscall_64+0x103/0x610 [ 187.754185][T10625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.761618][T10625] RIP: 0033:0x457717 [ 187.765515][T10625] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.785127][T10625] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 187.793538][T10625] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457717 [ 187.801517][T10625] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000140 22:13:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0xfa}], 0x83) [ 187.809495][T10625] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 187.817497][T10625] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 187.825489][T10625] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:38 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x06\x00'}) [ 187.991062][T10625] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 188.007033][T10631] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:38 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\a\x00'}) 22:13:38 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfc\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:39 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x8000000}], 0x83) 22:13:39 executing program 4 (fault-call:0 fault-nth:29): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:39 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x03\x00'}) 22:13:39 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x300}], 0x83) [ 188.236154][T10631] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 188.273758][T10653] FAULT_INJECTION: forcing a failure. [ 188.273758][T10653] name failslab, interval 1, probability 0, space 0, times 0 [ 188.341154][T10653] CPU: 1 PID: 10653 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 188.349218][T10653] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.359295][T10653] Call Trace: [ 188.362635][T10653] dump_stack+0x172/0x1f0 [ 188.367015][T10653] should_fail.cold+0xa/0x15 [ 188.371644][T10653] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 188.378529][T10653] ? ___might_sleep+0x163/0x280 [ 188.383607][T10653] __should_failslab+0x121/0x190 [ 188.388585][T10653] should_failslab+0x9/0x14 [ 188.393115][T10653] kmem_cache_alloc+0x2b2/0x6f0 [ 188.397993][T10653] ? rcu_read_lock_sched_held+0x110/0x130 [ 188.403758][T10653] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 188.410066][T10653] ? __mark_inode_dirty+0x241/0x1290 [ 188.415370][T10653] ext4_mb_new_blocks+0x5a8/0x3c70 [ 188.420488][T10653] ? mark_held_locks+0xa4/0xf0 [ 188.425260][T10653] ? ext4_find_extent+0x76e/0x9d0 [ 188.430310][T10653] ext4_ext_map_blocks+0x2c28/0x5300 [ 188.435619][T10653] ? ext4_ext_release+0x10/0x10 [ 188.440480][T10653] ? find_held_lock+0x35/0x130 [ 188.445285][T10653] ext4_map_blocks+0x8c5/0x18e0 [ 188.450157][T10653] ? ext4_issue_zeroout+0x190/0x190 [ 188.455405][T10653] ? kasan_check_write+0x14/0x20 [ 188.460359][T10653] ? __brelse+0x95/0xb0 [ 188.464533][T10653] ext4_getblk+0xc4/0x510 [ 188.468877][T10653] ? ext4_iomap_begin+0xfe0/0xfe0 [ 188.473922][T10653] ? ext4_free_inode+0x1450/0x1450 [ 188.479049][T10653] ext4_bread+0x8f/0x230 [ 188.483300][T10653] ? ext4_getblk+0x510/0x510 [ 188.487906][T10653] ext4_append+0x155/0x370 [ 188.492340][T10653] ext4_mkdir+0x61b/0xdf0 [ 188.496701][T10653] ? ext4_init_dot_dotdot+0x520/0x520 [ 188.502089][T10653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 188.508335][T10653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 188.514725][T10653] ? security_inode_permission+0xd5/0x110 [ 188.520460][T10653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 188.526718][T10653] ? security_inode_mkdir+0xee/0x120 [ 188.532019][T10653] vfs_mkdir+0x433/0x690 [ 188.536452][T10653] do_mkdirat+0x234/0x2a0 [ 188.540791][T10653] ? __ia32_sys_mknod+0xb0/0xb0 [ 188.545653][T10653] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 188.551126][T10653] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.557214][T10653] ? do_syscall_64+0x26/0x610 [ 188.561925][T10653] ? lockdep_hardirqs_on+0x418/0x5d0 [ 188.567255][T10653] __x64_sys_mkdir+0x5c/0x80 [ 188.571868][T10653] do_syscall_64+0x103/0x610 [ 188.576478][T10653] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 188.582377][T10653] RIP: 0033:0x457717 [ 188.586287][T10653] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 188.605897][T10653] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 188.614324][T10653] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457717 [ 188.622307][T10653] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000140 [ 188.630287][T10653] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 22:13:39 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 188.638280][T10653] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 188.646262][T10653] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:39 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x11000000}], 0x83) 22:13:39 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x05\x00'}) 22:13:39 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfd\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 188.752019][T10667] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:39 executing program 4 (fault-call:0 fault-nth:30): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:39 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x500}], 0x83) [ 188.830240][T10667] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 188.906103][T10681] FAULT_INJECTION: forcing a failure. [ 188.906103][T10681] name failslab, interval 1, probability 0, space 0, times 0 [ 188.936755][T10681] CPU: 1 PID: 10681 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 188.944787][T10681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.954855][T10681] Call Trace: [ 188.958176][T10681] dump_stack+0x172/0x1f0 [ 188.962567][T10681] should_fail.cold+0xa/0x15 [ 188.967178][T10681] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 188.973324][T10681] ? ___might_sleep+0x163/0x280 [ 188.973348][T10681] __should_failslab+0x121/0x190 [ 188.983292][T10681] should_failslab+0x9/0x14 [ 188.987818][T10681] kmem_cache_alloc+0x2b2/0x6f0 [ 188.992690][T10681] ? rcu_read_lock_sched_held+0x110/0x130 [ 188.998432][T10681] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 189.004783][T10681] ? __mark_inode_dirty+0x241/0x1290 [ 189.010090][T10681] ext4_mb_new_blocks+0x5a8/0x3c70 [ 189.015230][T10681] ? mark_held_locks+0xa4/0xf0 [ 189.020016][T10681] ? ext4_find_extent+0x76e/0x9d0 [ 189.025072][T10681] ext4_ext_map_blocks+0x2c28/0x5300 [ 189.030412][T10681] ? ext4_ext_release+0x10/0x10 [ 189.035280][T10681] ? find_held_lock+0x35/0x130 [ 189.040089][T10681] ext4_map_blocks+0x8c5/0x18e0 [ 189.044965][T10681] ? ext4_issue_zeroout+0x190/0x190 [ 189.050224][T10681] ? kasan_check_write+0x14/0x20 [ 189.055194][T10681] ? __brelse+0x95/0xb0 [ 189.059380][T10681] ext4_getblk+0xc4/0x510 [ 189.063735][T10681] ? ext4_iomap_begin+0xfe0/0xfe0 [ 189.068776][T10681] ? ext4_free_inode+0x1450/0x1450 [ 189.073907][T10681] ext4_bread+0x8f/0x230 [ 189.078162][T10681] ? ext4_getblk+0x510/0x510 [ 189.082782][T10681] ext4_append+0x155/0x370 [ 189.087224][T10681] ext4_mkdir+0x61b/0xdf0 [ 189.091610][T10681] ? ext4_init_dot_dotdot+0x520/0x520 [ 189.097003][T10681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.103265][T10681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.109532][T10681] ? security_inode_permission+0xd5/0x110 [ 189.115271][T10681] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 189.121531][T10681] ? security_inode_mkdir+0xee/0x120 [ 189.126837][T10681] vfs_mkdir+0x433/0x690 [ 189.131104][T10681] do_mkdirat+0x234/0x2a0 [ 189.135458][T10681] ? __ia32_sys_mknod+0xb0/0xb0 [ 189.140325][T10681] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 189.145807][T10681] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.151887][T10681] ? do_syscall_64+0x26/0x610 [ 189.156578][T10681] ? lockdep_hardirqs_on+0x418/0x5d0 [ 189.161883][T10681] __x64_sys_mkdir+0x5c/0x80 [ 189.166510][T10681] do_syscall_64+0x103/0x610 [ 189.171120][T10681] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.177041][T10681] RIP: 0033:0x457717 [ 189.180949][T10681] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 7d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 5d c4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:13:39 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:40 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x12000000}], 0x83) 22:13:40 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x06\x00'}) [ 189.200570][T10681] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 189.209025][T10681] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000457717 [ 189.217012][T10681] RDX: 0000000000000004 RSI: 00000000000001ff RDI: 0000000020000140 [ 189.224996][T10681] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 189.232983][T10681] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000004 [ 189.240966][T10681] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:40 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\a\x00'}) 22:13:40 executing program 4 (fault-call:0 fault-nth:31): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x1100}], 0x83) [ 189.339976][T10688] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:40 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfi\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:40 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00?\x00'}) [ 189.440226][T10688] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:40 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x14000000}], 0x83) 22:13:40 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 189.530837][T10704] FAULT_INJECTION: forcing a failure. [ 189.530837][T10704] name failslab, interval 1, probability 0, space 0, times 0 [ 189.580832][T10704] CPU: 0 PID: 10704 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 189.588880][T10704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.598954][T10704] Call Trace: [ 189.602265][T10704] dump_stack+0x172/0x1f0 [ 189.606614][T10704] should_fail.cold+0xa/0x15 [ 189.611239][T10704] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 189.617060][T10704] ? ___might_sleep+0x163/0x280 [ 189.621926][T10704] __should_failslab+0x121/0x190 [ 189.626874][T10704] should_failslab+0x9/0x14 [ 189.631389][T10704] __kmalloc_track_caller+0x2d8/0x740 [ 189.636777][T10704] ? lock_downgrade+0x880/0x880 [ 189.641646][T10704] ? strndup_user+0x77/0xd0 [ 189.646166][T10704] memdup_user+0x26/0xb0 [ 189.650438][T10704] strndup_user+0x77/0xd0 [ 189.654780][T10704] ksys_mount+0x3c/0x150 [ 189.659033][T10704] __x64_sys_mount+0xbe/0x150 [ 189.663727][T10704] do_syscall_64+0x103/0x610 [ 189.668335][T10704] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 189.674250][T10704] RIP: 0033:0x45ad6a [ 189.678151][T10704] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 189.697851][T10704] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 189.706290][T10704] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 189.714279][T10704] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 189.722352][T10704] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 189.730335][T10704] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 189.738317][T10704] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:40 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x1200}], 0x83) 22:13:40 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00@\x00'}) 22:13:40 executing program 4 (fault-call:0 fault-nth:32): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 189.860084][T10717] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 189.902452][T10722] FAULT_INJECTION: forcing a failure. [ 189.902452][T10722] name failslab, interval 1, probability 0, space 0, times 0 [ 189.915490][T10722] CPU: 0 PID: 10722 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 189.923485][T10722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.933553][T10722] Call Trace: [ 189.936863][T10722] dump_stack+0x172/0x1f0 [ 189.941223][T10722] should_fail.cold+0xa/0x15 [ 189.945833][T10722] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 189.951649][T10722] ? __sigqueue_alloc+0x173/0x4d0 [ 189.956688][T10722] ? find_held_lock+0x35/0x130 [ 189.961481][T10722] __should_failslab+0x121/0x190 [ 189.966444][T10722] should_failslab+0x9/0x14 [ 189.970964][T10722] kmem_cache_alloc+0x47/0x6f0 [ 189.975838][T10722] ? kasan_check_read+0x11/0x20 [ 189.980725][T10722] __sigqueue_alloc+0x268/0x4d0 [ 189.985606][T10722] __send_signal+0xda3/0x1590 [ 189.990299][T10722] send_signal+0x49/0xd0 [ 189.994561][T10722] force_sig_info+0x251/0x310 [ 189.999280][T10722] force_sig_fault+0xbb/0xf0 [ 190.003887][T10722] ? force_sigsegv+0x120/0x120 [ 190.008682][T10722] ? trace_hardirqs_on+0x67/0x230 [ 190.013820][T10722] __bad_area_nosemaphore+0x332/0x420 [ 190.019243][T10722] bad_area+0x69/0x80 [ 190.023253][T10722] __do_page_fault+0x996/0xda0 [ 190.028083][T10722] do_page_fault+0x71/0x581 [ 190.032601][T10722] ? page_fault+0x8/0x30 [ 190.036854][T10722] page_fault+0x1e/0x30 [ 190.041013][T10722] RIP: 0033:0x451faf [ 190.045464][T10722] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 190.045485][T10722] RSP: 002b:00007fb8aede9a88 EFLAGS: 00010283 [ 190.045505][T10722] RAX: 00007fb8aede9b40 RBX: 0000000000000010 RCX: 0000000000000000 [ 190.079171][T10722] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fb8aede9b40 [ 190.087165][T10722] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 190.095168][T10722] R10: 0000000000000075 R11: 00000000004e1da0 R12: 0000000000000004 22:13:40 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x15000000}], 0x83) 22:13:41 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x02\x00'}) [ 190.103164][T10722] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:41 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfl\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x1400}], 0x83) [ 190.220073][T10722] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 190.241033][T10717] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:41 executing program 4 (fault-call:0 fault-nth:33): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:41 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x01\x00'}) 22:13:41 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x16000000}], 0x83) [ 190.445747][T10740] FAULT_INJECTION: forcing a failure. [ 190.445747][T10740] name failslab, interval 1, probability 0, space 0, times 0 [ 190.468863][T10740] CPU: 0 PID: 10740 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 190.476892][T10740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.486961][T10740] Call Trace: [ 190.486995][T10740] dump_stack+0x172/0x1f0 [ 190.494616][T10740] should_fail.cold+0xa/0x15 [ 190.499236][T10740] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 190.499256][T10740] ? ___might_sleep+0x163/0x280 [ 190.499274][T10740] __should_failslab+0x121/0x190 [ 190.499289][T10740] should_failslab+0x9/0x14 [ 190.499303][T10740] __kmalloc_track_caller+0x2d8/0x740 [ 190.499319][T10740] ? lock_downgrade+0x880/0x880 [ 190.499336][T10740] ? strndup_user+0x77/0xd0 [ 190.499355][T10740] memdup_user+0x26/0xb0 [ 190.499375][T10740] strndup_user+0x77/0xd0 [ 190.542738][T10740] ksys_mount+0x3c/0x150 [ 190.547011][T10740] __x64_sys_mount+0xbe/0x150 [ 190.551728][T10740] do_syscall_64+0x103/0x610 [ 190.556353][T10740] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 190.562275][T10740] RIP: 0033:0x45ad6a [ 190.566192][T10740] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 190.585834][T10740] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:13:41 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x02\x00'}) [ 190.594268][T10740] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 190.602263][T10740] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 190.610250][T10740] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 190.618250][T10740] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 190.626247][T10740] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:41 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x1500}], 0x83) 22:13:41 executing program 4 (fault-call:0 fault-nth:34): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:41 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x03\x00'}) 22:13:41 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x1f000000}], 0x83) 22:13:41 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 190.880540][T10764] FAULT_INJECTION: forcing a failure. [ 190.880540][T10764] name failslab, interval 1, probability 0, space 0, times 0 [ 190.893697][T10764] CPU: 1 PID: 10764 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 190.901684][T10764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.901691][T10764] Call Trace: [ 190.901726][T10764] dump_stack+0x172/0x1f0 [ 190.901750][T10764] should_fail.cold+0xa/0x15 [ 190.901772][T10764] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 190.929802][T10764] ? __sigqueue_alloc+0x173/0x4d0 [ 190.934832][T10764] ? find_held_lock+0x35/0x130 [ 190.934856][T10764] __should_failslab+0x121/0x190 [ 190.934872][T10764] should_failslab+0x9/0x14 [ 190.934887][T10764] kmem_cache_alloc+0x47/0x6f0 [ 190.934908][T10764] ? kasan_check_read+0x11/0x20 [ 190.953835][T10764] __sigqueue_alloc+0x268/0x4d0 [ 190.953855][T10764] __send_signal+0xda3/0x1590 [ 190.953877][T10764] send_signal+0x49/0xd0 [ 190.953894][T10764] force_sig_info+0x251/0x310 [ 190.953915][T10764] force_sig_fault+0xbb/0xf0 [ 190.963987][T10764] ? force_sigsegv+0x120/0x120 [ 190.964014][T10764] ? trace_hardirqs_on+0x67/0x230 [ 190.964037][T10764] __bad_area_nosemaphore+0x332/0x420 [ 190.964059][T10764] bad_area+0x69/0x80 [ 190.964079][T10764] __do_page_fault+0x996/0xda0 [ 191.001318][T10764] do_page_fault+0x71/0x581 [ 191.010552][T10764] ? page_fault+0x8/0x30 [ 191.010569][T10764] page_fault+0x1e/0x30 [ 191.010582][T10764] RIP: 0033:0x451faf [ 191.010598][T10764] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 191.010606][T10764] RSP: 002b:00007fb8aede9a88 EFLAGS: 00010283 [ 191.010618][T10764] RAX: 00007fb8aede9b40 RBX: 0000000000000010 RCX: 0000000000000000 [ 191.010626][T10764] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007fb8aede9b40 [ 191.010635][T10764] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 191.010643][T10764] R10: 0000000000000075 R11: 00000000004e1da0 R12: 0000000000000004 22:13:42 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfo\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:42 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x04\x00'}) 22:13:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x1600}], 0x83) [ 191.010651][T10764] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:42 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x05\x00'}) 22:13:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x100000000000000}], 0x83) 22:13:42 executing program 4 (fault-call:0 fault-nth:35): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:42 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs#', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x1f00}], 0x83) [ 191.427819][T10793] FAULT_INJECTION: forcing a failure. [ 191.427819][T10793] name failslab, interval 1, probability 0, space 0, times 0 22:13:42 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x06\x00'}) [ 191.496177][T10793] CPU: 0 PID: 10793 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 191.504194][T10793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.504214][T10793] Call Trace: [ 191.504241][T10793] dump_stack+0x172/0x1f0 [ 191.504264][T10793] should_fail.cold+0xa/0x15 [ 191.526480][T10793] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 191.532299][T10793] ? ___might_sleep+0x163/0x280 [ 191.537167][T10793] __should_failslab+0x121/0x190 [ 191.537184][T10793] should_failslab+0x9/0x14 [ 191.537216][T10793] kmem_cache_alloc+0x2b2/0x6f0 [ 191.537236][T10793] ? kmem_cache_alloc_trace+0x5a4/0x760 [ 191.557024][T10793] ? find_held_lock+0x35/0x130 [ 191.561800][T10793] getname_flags+0xd6/0x5b0 [ 191.566311][T10793] ? kasan_check_write+0x14/0x20 [ 191.571286][T10793] user_path_at_empty+0x2f/0x50 [ 191.576145][T10793] do_mount+0x150/0x2c40 [ 191.580394][T10793] ? copy_mount_options+0x5c/0x3a0 [ 191.585512][T10793] ? copy_mount_string+0x40/0x40 [ 191.590462][T10793] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 22:13:42 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\a\x00'}) [ 191.596704][T10793] ? copy_mount_options+0x280/0x3a0 [ 191.601928][T10793] ksys_mount+0xdb/0x150 [ 191.606178][T10793] __x64_sys_mount+0xbe/0x150 [ 191.610876][T10793] do_syscall_64+0x103/0x610 [ 191.615480][T10793] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 191.621374][T10793] RIP: 0033:0x45ad6a [ 191.621391][T10793] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 22:13:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x200000000000000}], 0x83) 22:13:42 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00?\x00'}) [ 191.621399][T10793] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 191.621413][T10793] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 191.621422][T10793] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 191.621430][T10793] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 191.621439][T10793] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 191.621447][T10793] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:42 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfp\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:42 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs ', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x3f00}], 0x83) 22:13:42 executing program 4 (fault-call:0 fault-nth:36): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:42 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00@\x00'}) 22:13:42 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x300000000000000}], 0x83) [ 192.025018][T10829] FAULT_INJECTION: forcing a failure. [ 192.025018][T10829] name failslab, interval 1, probability 0, space 0, times 0 [ 192.044137][T10829] CPU: 1 PID: 10829 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 192.052153][T10829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.062235][T10829] Call Trace: [ 192.065546][T10829] dump_stack+0x172/0x1f0 [ 192.065572][T10829] should_fail.cold+0xa/0x15 [ 192.065595][T10829] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 192.074499][T10829] ? ___might_sleep+0x163/0x280 [ 192.074519][T10829] __should_failslab+0x121/0x190 [ 192.074534][T10829] should_failslab+0x9/0x14 [ 192.074563][T10829] kmem_cache_alloc_trace+0x2d1/0x760 [ 192.085210][T10829] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.085228][T10829] ? _copy_from_user+0xdd/0x150 [ 192.085247][T10829] copy_mount_options+0x5c/0x3a0 [ 192.085267][T10829] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 22:13:43 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfu\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:43 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 192.094688][T10829] ksys_mount+0xa7/0x150 [ 192.094712][T10829] __x64_sys_mount+0xbe/0x150 [ 192.094736][T10829] do_syscall_64+0x103/0x610 [ 192.106322][T10829] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.106334][T10829] RIP: 0033:0x45ad6a [ 192.106350][T10829] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 192.106357][T10829] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:13:43 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0xfa00}], 0x83) [ 192.116133][T10829] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 192.116142][T10829] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 192.116151][T10829] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 192.116160][T10829] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 192.116168][T10829] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x400000000000000}], 0x83) 22:13:43 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:43 executing program 4 (fault-call:0 fault-nth:37): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:43 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:43 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x1000000}], 0x83) 22:13:43 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfx\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 192.552635][T10858] FAULT_INJECTION: forcing a failure. [ 192.552635][T10858] name failslab, interval 1, probability 0, space 0, times 0 [ 192.588337][T10858] CPU: 1 PID: 10858 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 192.596400][T10858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.606468][T10858] Call Trace: [ 192.609791][T10858] dump_stack+0x172/0x1f0 [ 192.614147][T10858] should_fail.cold+0xa/0x15 [ 192.618764][T10858] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 192.624595][T10858] ? ___might_sleep+0x163/0x280 [ 192.629468][T10858] __should_failslab+0x121/0x190 [ 192.634427][T10858] should_failslab+0x9/0x14 [ 192.638955][T10858] kmem_cache_alloc_trace+0x2d1/0x760 [ 192.644372][T10858] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.650635][T10858] ? _copy_from_user+0xdd/0x150 [ 192.655510][T10858] copy_mount_options+0x5c/0x3a0 [ 192.660510][T10858] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 192.666772][T10858] ksys_mount+0xa7/0x150 [ 192.671063][T10858] __x64_sys_mount+0xbe/0x150 [ 192.675762][T10858] do_syscall_64+0x103/0x610 [ 192.680376][T10858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 192.686282][T10858] RIP: 0033:0x45ad6a [ 192.690188][T10858] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 192.709813][T10858] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 192.718241][T10858] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 192.726235][T10858] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 192.734234][T10858] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 192.742226][T10858] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 22:13:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x500000000000000}], 0x83) 22:13:43 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 192.750224][T10858] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:43 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:43 executing program 4 (fault-call:0 fault-nth:38): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:43 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x2000000}], 0x83) 22:13:43 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x800000000000000}], 0x83) [ 193.002053][T10879] FAULT_INJECTION: forcing a failure. [ 193.002053][T10879] name failslab, interval 1, probability 0, space 0, times 0 [ 193.016145][T10875] __ntfs_error: 7 callbacks suppressed [ 193.016157][T10875] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 193.046909][T10879] CPU: 1 PID: 10879 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 193.054948][T10879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.054955][T10879] Call Trace: [ 193.054983][T10879] dump_stack+0x172/0x1f0 [ 193.055006][T10879] should_fail.cold+0xa/0x15 [ 193.068371][T10879] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 193.068392][T10879] ? ___might_sleep+0x163/0x280 [ 193.068413][T10879] __should_failslab+0x121/0x190 [ 193.077351][T10879] should_failslab+0x9/0x14 [ 193.088008][T10879] kmem_cache_alloc_trace+0x2d1/0x760 [ 193.088027][T10879] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 193.088049][T10879] ? rcu_read_lock_sched_held+0x110/0x130 [ 193.114396][T10879] ? kmem_cache_alloc_trace+0x354/0x760 [ 193.119996][T10879] legacy_init_fs_context+0x48/0xe0 [ 193.125218][T10879] ? generic_parse_monolithic+0x200/0x200 [ 193.130950][T10879] alloc_fs_context+0x365/0x640 [ 193.135835][T10879] fs_context_for_mount+0x25/0x30 [ 193.140885][T10879] do_mount+0x13d7/0x2c40 [ 193.145243][T10879] ? copy_mount_string+0x40/0x40 [ 193.150204][T10879] ? _copy_from_user+0xdd/0x150 [ 193.155069][T10879] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.161318][T10879] ? copy_mount_options+0x280/0x3a0 [ 193.166531][T10879] ksys_mount+0xdb/0x150 [ 193.170782][T10879] __x64_sys_mount+0xbe/0x150 [ 193.175496][T10879] do_syscall_64+0x103/0x610 [ 193.180104][T10879] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.186007][T10879] RIP: 0033:0x45ad6a [ 193.189937][T10879] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 193.209638][T10879] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 193.218065][T10879] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 193.226055][T10879] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 193.234066][T10879] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 193.242055][T10879] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 193.250040][T10879] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:44 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:44 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x10', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:44 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x3000000}], 0x83) 22:13:44 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x02', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:44 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:44 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x1100000000000000}], 0x83) 22:13:44 executing program 4 (fault-call:0 fault-nth:39): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:44 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x4000000}], 0x83) 22:13:44 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:44 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x03', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:44 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x0f', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 193.673658][T10917] FAULT_INJECTION: forcing a failure. [ 193.673658][T10917] name failslab, interval 1, probability 0, space 0, times 0 [ 193.714875][T10917] CPU: 1 PID: 10917 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 193.722915][T10917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.732985][T10917] Call Trace: [ 193.733019][T10917] dump_stack+0x172/0x1f0 [ 193.733041][T10917] should_fail.cold+0xa/0x15 [ 193.733060][T10917] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 193.733082][T10917] ? ___might_sleep+0x163/0x280 [ 193.733107][T10917] __should_failslab+0x121/0x190 [ 193.755953][T10917] should_failslab+0x9/0x14 [ 193.755971][T10917] kmem_cache_alloc_trace+0x2d1/0x760 [ 193.755988][T10917] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 193.756009][T10917] ? rcu_read_lock_sched_held+0x110/0x130 [ 193.783833][T10917] ? kmem_cache_alloc_trace+0x354/0x760 [ 193.789412][T10917] legacy_init_fs_context+0x48/0xe0 [ 193.794633][T10917] ? generic_parse_monolithic+0x200/0x200 [ 193.800374][T10917] alloc_fs_context+0x365/0x640 [ 193.805253][T10917] fs_context_for_mount+0x25/0x30 [ 193.810294][T10917] do_mount+0x13d7/0x2c40 [ 193.814645][T10917] ? copy_mount_string+0x40/0x40 [ 193.819607][T10917] ? _copy_from_user+0xdd/0x150 [ 193.824481][T10917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 193.830746][T10917] ? copy_mount_options+0x280/0x3a0 [ 193.835972][T10917] ksys_mount+0xdb/0x150 [ 193.840375][T10917] __x64_sys_mount+0xbe/0x150 [ 193.845078][T10917] do_syscall_64+0x103/0x610 [ 193.849690][T10917] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 193.855600][T10917] RIP: 0033:0x45ad6a [ 193.859510][T10917] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 193.879131][T10917] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 193.887558][T10917] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 193.896040][T10917] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 193.904022][T10917] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 22:13:44 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x1200000000000000}], 0x83) 22:13:44 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 193.912006][T10917] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 193.919997][T10917] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:44 executing program 4 (fault-call:0 fault-nth:40): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:45 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:45 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x5000000}], 0x83) 22:13:45 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x04', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:45 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:45 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x1400000000000000}], 0x83) 22:13:45 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 194.269330][T10948] FAULT_INJECTION: forcing a failure. [ 194.269330][T10948] name failslab, interval 1, probability 0, space 0, times 0 [ 194.339866][T10948] CPU: 0 PID: 10948 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 194.348038][T10948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.358508][T10948] Call Trace: [ 194.361839][T10948] dump_stack+0x172/0x1f0 [ 194.366222][T10948] should_fail.cold+0xa/0x15 [ 194.370848][T10948] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 194.376953][T10948] ? ___might_sleep+0x163/0x280 [ 194.381837][T10948] __should_failslab+0x121/0x190 [ 194.386800][T10948] should_failslab+0x9/0x14 [ 194.391331][T10948] kmem_cache_alloc_trace+0x2d1/0x760 [ 194.396853][T10948] ? kasan_check_write+0x14/0x20 [ 194.402279][T10948] ? lock_downgrade+0x880/0x880 [ 194.407163][T10948] alloc_super+0x55/0x890 [ 194.411537][T10948] ? kasan_check_read+0x11/0x20 [ 194.416415][T10948] ? test_single_super+0x10/0x10 [ 194.421484][T10948] sget_userns+0xf1/0x560 [ 194.425834][T10948] ? kill_litter_super+0x60/0x60 [ 194.430817][T10948] ? test_single_super+0x10/0x10 [ 194.435763][T10948] ? kill_litter_super+0x60/0x60 [ 194.440708][T10948] sget+0x10c/0x150 [ 194.444525][T10948] mount_bdev+0xff/0x3c0 [ 194.448767][T10948] ? load_system_files+0x7620/0x7620 [ 194.454060][T10948] ntfs_mount+0x35/0x40 [ 194.458233][T10948] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 194.463790][T10948] legacy_get_tree+0xf2/0x200 [ 194.468484][T10948] vfs_get_tree+0x123/0x450 [ 194.472994][T10948] do_mount+0x1436/0x2c40 [ 194.477336][T10948] ? copy_mount_string+0x40/0x40 [ 194.482285][T10948] ? _copy_from_user+0xdd/0x150 [ 194.487150][T10948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 194.493404][T10948] ? copy_mount_options+0x280/0x3a0 [ 194.498634][T10948] ksys_mount+0xdb/0x150 [ 194.502916][T10948] __x64_sys_mount+0xbe/0x150 [ 194.507607][T10948] do_syscall_64+0x103/0x610 [ 194.512233][T10948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 194.518143][T10948] RIP: 0033:0x45ad6a 22:13:45 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x11000000}], 0x83) [ 194.522053][T10948] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 194.541664][T10948] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 194.550093][T10948] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 194.558077][T10948] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 194.566064][T10948] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 194.574077][T10948] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 194.582064][T10948] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:45 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\xff\xff'}) 22:13:45 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x05', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:45 executing program 4 (fault-call:0 fault-nth:41): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:45 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x1500000000000000}], 0x83) [ 194.760228][T10966] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:45 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x02\x00'}) 22:13:45 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x12000000}], 0x83) [ 194.867492][T10979] FAULT_INJECTION: forcing a failure. [ 194.867492][T10979] name failslab, interval 1, probability 0, space 0, times 0 [ 194.867913][T10966] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 194.888314][T10979] CPU: 1 PID: 10979 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 194.897911][T10979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.907970][T10979] Call Trace: [ 194.907999][T10979] dump_stack+0x172/0x1f0 [ 194.908021][T10979] should_fail.cold+0xa/0x15 [ 194.908042][T10979] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 194.908063][T10979] ? ___might_sleep+0x163/0x280 [ 194.908084][T10979] __should_failslab+0x121/0x190 [ 194.908099][T10979] should_failslab+0x9/0x14 [ 194.908124][T10979] kmem_cache_alloc_trace+0x2d1/0x760 [ 194.915732][T10979] ? kasan_check_write+0x14/0x20 [ 194.926101][T10979] ? lock_downgrade+0x880/0x880 [ 194.955441][T10979] alloc_super+0x55/0x890 [ 194.959784][T10979] ? kasan_check_read+0x11/0x20 [ 194.964737][T10979] ? test_single_super+0x10/0x10 [ 194.969683][T10979] sget_userns+0xf1/0x560 [ 194.974023][T10979] ? kill_litter_super+0x60/0x60 [ 194.978971][T10979] ? test_single_super+0x10/0x10 [ 194.983924][T10979] ? kill_litter_super+0x60/0x60 [ 194.988868][T10979] sget+0x10c/0x150 [ 194.992685][T10979] mount_bdev+0xff/0x3c0 [ 194.996940][T10979] ? load_system_files+0x7620/0x7620 [ 195.002243][T10979] ntfs_mount+0x35/0x40 [ 195.006411][T10979] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 195.011967][T10979] legacy_get_tree+0xf2/0x200 [ 195.016656][T10979] vfs_get_tree+0x123/0x450 [ 195.021187][T10979] do_mount+0x1436/0x2c40 [ 195.025569][T10979] ? copy_mount_string+0x40/0x40 [ 195.030523][T10979] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 195.035994][T10979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 195.042255][T10979] ? copy_mount_options+0x280/0x3a0 [ 195.047470][T10979] ksys_mount+0xdb/0x150 [ 195.051735][T10979] __x64_sys_mount+0xbe/0x150 [ 195.056434][T10979] do_syscall_64+0x103/0x610 [ 195.061071][T10979] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.066972][T10979] RIP: 0033:0x45ad6a [ 195.070875][T10979] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 195.090508][T10979] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 195.098933][T10979] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 195.106934][T10979] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 195.114919][T10979] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 195.122900][T10979] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 195.130884][T10979] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:46 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x1600000000000000}], 0x83) 22:13:46 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:46 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x06', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:46 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x03\x00'}) 22:13:46 executing program 4 (fault-call:0 fault-nth:42): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:46 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x14000000}], 0x83) [ 195.409895][T10993] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 195.447167][T11004] FAULT_INJECTION: forcing a failure. [ 195.447167][T11004] name failslab, interval 1, probability 0, space 0, times 0 22:13:46 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x1f00000000000000}], 0x83) 22:13:46 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x04\x00'}) [ 195.495808][T11004] CPU: 0 PID: 11004 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 195.503824][T11004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.513891][T11004] Call Trace: [ 195.517218][T11004] dump_stack+0x172/0x1f0 [ 195.521569][T11004] should_fail.cold+0xa/0x15 [ 195.526174][T11004] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 195.532015][T11004] ? ___might_sleep+0x163/0x280 [ 195.536875][T11004] __should_failslab+0x121/0x190 [ 195.541818][T11004] should_failslab+0x9/0x14 [ 195.541836][T11004] kmem_cache_alloc_trace+0x2d1/0x760 [ 195.541854][T11004] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 195.541869][T11004] ? rcu_read_lock_sched_held+0x110/0x130 [ 195.541883][T11004] ? kmem_cache_alloc_trace+0x354/0x760 [ 195.541906][T11004] legacy_init_fs_context+0x48/0xe0 [ 195.541921][T11004] ? generic_parse_monolithic+0x200/0x200 [ 195.541933][T11004] alloc_fs_context+0x365/0x640 [ 195.541950][T11004] fs_context_for_mount+0x25/0x30 [ 195.541964][T11004] do_mount+0x13d7/0x2c40 [ 195.541984][T11004] ? copy_mount_string+0x40/0x40 [ 195.542006][T11004] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 195.557656][T11004] ? copy_mount_options+0x280/0x3a0 [ 195.557674][T11004] ksys_mount+0xdb/0x150 [ 195.557692][T11004] __x64_sys_mount+0xbe/0x150 [ 195.557711][T11004] do_syscall_64+0x103/0x610 [ 195.557732][T11004] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 195.629707][T11004] RIP: 0033:0x45ad6a [ 195.633609][T11004] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 195.653236][T11004] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 195.661705][T11004] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 195.669683][T11004] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 195.677661][T11004] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 195.685639][T11004] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 195.693611][T11004] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 195.713057][T10993] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:46 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x05\x00'}) 22:13:46 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\a', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:46 executing program 4 (fault-call:0 fault-nth:43): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:46 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:46 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x15000000}], 0x83) 22:13:46 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x18) 22:13:46 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x06\x00'}) [ 195.964961][T11025] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 196.065496][T11029] FAULT_INJECTION: forcing a failure. [ 196.065496][T11029] name failslab, interval 1, probability 0, space 0, times 0 [ 196.100088][T11025] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 196.125759][T11029] CPU: 0 PID: 11029 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 196.133786][T11029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.143846][T11029] Call Trace: [ 196.147150][T11029] dump_stack+0x172/0x1f0 [ 196.151495][T11029] should_fail.cold+0xa/0x15 [ 196.156095][T11029] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 196.161910][T11029] ? ___might_sleep+0x163/0x280 [ 196.166768][T11029] __should_failslab+0x121/0x190 [ 196.171712][T11029] should_failslab+0x9/0x14 [ 196.176237][T11029] kmem_cache_alloc_trace+0x2d1/0x760 [ 196.181626][T11029] ? kasan_check_write+0x14/0x20 [ 196.186574][T11029] ? lock_downgrade+0x880/0x880 [ 196.191428][T11029] alloc_super+0x55/0x890 [ 196.195764][T11029] ? kasan_check_read+0x11/0x20 [ 196.200619][T11029] ? test_single_super+0x10/0x10 [ 196.205574][T11029] sget_userns+0xf1/0x560 [ 196.209931][T11029] ? kill_litter_super+0x60/0x60 [ 196.214883][T11029] ? test_single_super+0x10/0x10 [ 196.219841][T11029] ? kill_litter_super+0x60/0x60 [ 196.224799][T11029] sget+0x10c/0x150 [ 196.228645][T11029] mount_bdev+0xff/0x3c0 [ 196.232905][T11029] ? load_system_files+0x7620/0x7620 [ 196.238220][T11029] ntfs_mount+0x35/0x40 [ 196.242393][T11029] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 196.247959][T11029] legacy_get_tree+0xf2/0x200 [ 196.252657][T11029] vfs_get_tree+0x123/0x450 [ 196.257177][T11029] do_mount+0x1436/0x2c40 [ 196.261545][T11029] ? copy_mount_string+0x40/0x40 [ 196.266497][T11029] ? _copy_from_user+0xdd/0x150 [ 196.271362][T11029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.277613][T11029] ? copy_mount_options+0x280/0x3a0 [ 196.282834][T11029] ksys_mount+0xdb/0x150 [ 196.287103][T11029] __x64_sys_mount+0xbe/0x150 [ 196.291812][T11029] do_syscall_64+0x103/0x610 [ 196.296459][T11029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.302403][T11029] RIP: 0033:0x45ad6a [ 196.306318][T11029] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 22:13:47 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\n', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:47 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\a\x00'}) 22:13:47 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x16000000}], 0x83) [ 196.325954][T11029] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 196.334485][T11029] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 196.342481][T11029] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 196.350472][T11029] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 196.358462][T11029] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 196.366450][T11029] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:47 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:47 executing program 4 (fault-call:0 fault-nth:44): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:47 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x30) [ 196.468700][T11044] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:47 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x03\x00'}) 22:13:47 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x1f000000}], 0x83) [ 196.604151][T11052] FAULT_INJECTION: forcing a failure. [ 196.604151][T11052] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 196.617412][T11052] CPU: 0 PID: 11052 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 196.625389][T11052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.625396][T11052] Call Trace: [ 196.625428][T11052] dump_stack+0x172/0x1f0 [ 196.625448][T11052] should_fail.cold+0xa/0x15 [ 196.625468][T11052] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 196.625491][T11052] ? __lock_acquire+0x548/0x3fb0 [ 196.658967][T11052] should_fail_alloc_page+0x50/0x60 [ 196.664172][T11052] __alloc_pages_nodemask+0x1a1/0x7e0 [ 196.669566][T11052] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 196.675291][T11052] ? find_held_lock+0x35/0x130 [ 196.680070][T11052] ? __lock_acquire+0x548/0x3fb0 [ 196.685021][T11052] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 196.690837][T11052] cache_grow_begin+0x9c/0x860 [ 196.690854][T11052] ? getname_kernel+0x53/0x370 [ 196.690871][T11052] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 196.690888][T11052] kmem_cache_alloc+0x62d/0x6f0 [ 196.690901][T11052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.690913][T11052] ? should_fail+0x1de/0x852 [ 196.690933][T11052] getname_kernel+0x53/0x370 [ 196.690947][T11052] kern_path+0x20/0x40 [ 196.690965][T11052] lookup_bdev.part.0+0x7b/0x1b0 [ 196.690979][T11052] ? blkdev_open+0x290/0x290 [ 196.690993][T11052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.691007][T11052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.691031][T11052] ? vfs_parse_fs_string+0x111/0x170 [ 196.700544][T11052] blkdev_get_by_path+0x81/0x130 [ 196.700561][T11052] mount_bdev+0x5d/0x3c0 [ 196.700575][T11052] ? load_system_files+0x7620/0x7620 [ 196.700592][T11052] ? vfs_parse_fs_string+0x116/0x170 [ 196.700608][T11052] ntfs_mount+0x35/0x40 [ 196.700623][T11052] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 196.700637][T11052] legacy_get_tree+0xf2/0x200 [ 196.700657][T11052] vfs_get_tree+0x123/0x450 [ 196.723782][T11052] do_mount+0x1436/0x2c40 [ 196.723806][T11052] ? copy_mount_string+0x40/0x40 [ 196.723826][T11052] ? _copy_from_user+0xdd/0x150 [ 196.723845][T11052] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 196.723864][T11052] ? copy_mount_options+0x280/0x3a0 [ 196.752824][T11052] ksys_mount+0xdb/0x150 [ 196.752843][T11052] __x64_sys_mount+0xbe/0x150 [ 196.752864][T11052] do_syscall_64+0x103/0x610 [ 196.752884][T11052] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 196.752896][T11052] RIP: 0033:0x45ad6a 22:13:47 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x05\x00'}) 22:13:47 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x48) [ 196.752916][T11052] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 196.769472][T11052] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 196.769487][T11052] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 196.769497][T11052] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 196.769506][T11052] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 196.769514][T11052] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 196.769523][T11052] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:47 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 196.969760][T11052] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:13:47 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x0e', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:47 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x3f000000}], 0x83) 22:13:47 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x06\x00'}) 22:13:48 executing program 4 (fault-call:0 fault-nth:45): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:48 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\a\x00'}) [ 197.217616][T11076] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:48 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x60) 22:13:48 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:48 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00?\x00'}) [ 197.363811][T11084] FAULT_INJECTION: forcing a failure. [ 197.363811][T11084] name failslab, interval 1, probability 0, space 0, times 0 [ 197.422223][T11084] CPU: 1 PID: 11084 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 197.430258][T11084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.440347][T11084] Call Trace: [ 197.443660][T11084] dump_stack+0x172/0x1f0 [ 197.448006][T11084] should_fail.cold+0xa/0x15 [ 197.452621][T11084] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 197.458447][T11084] ? ___might_sleep+0x163/0x280 [ 197.463313][T11084] __should_failslab+0x121/0x190 [ 197.468268][T11084] should_failslab+0x9/0x14 [ 197.472876][T11084] __kmalloc+0x2dc/0x740 [ 197.477130][T11084] ? __list_lru_init+0xd1/0x6e0 [ 197.481989][T11084] __list_lru_init+0xd1/0x6e0 [ 197.486719][T11084] alloc_super+0x762/0x890 [ 197.491159][T11084] ? test_single_super+0x10/0x10 [ 197.496106][T11084] sget_userns+0xf1/0x560 [ 197.500509][T11084] ? kill_litter_super+0x60/0x60 [ 197.505461][T11084] ? test_single_super+0x10/0x10 [ 197.505472][T11084] ? kill_litter_super+0x60/0x60 [ 197.505486][T11084] sget+0x10c/0x150 [ 197.505504][T11084] mount_bdev+0xff/0x3c0 [ 197.505531][T11084] ? load_system_files+0x7620/0x7620 [ 197.528684][T11084] ntfs_mount+0x35/0x40 [ 197.532886][T11084] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 197.538445][T11084] legacy_get_tree+0xf2/0x200 [ 197.543334][T11084] vfs_get_tree+0x123/0x450 [ 197.547848][T11084] do_mount+0x1436/0x2c40 [ 197.552232][T11084] ? copy_mount_string+0x40/0x40 [ 197.557194][T11084] ? _copy_from_user+0xdd/0x150 [ 197.562068][T11084] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 197.568317][T11084] ? copy_mount_options+0x280/0x3a0 [ 197.573527][T11084] ksys_mount+0xdb/0x150 [ 197.577788][T11084] __x64_sys_mount+0xbe/0x150 [ 197.582486][T11084] do_syscall_64+0x103/0x610 [ 197.587089][T11084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 197.592988][T11084] RIP: 0033:0x45ad6a [ 197.596885][T11084] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 22:13:48 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00@\x00'}) 22:13:48 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0xfa000000}], 0x83) [ 197.616496][T11084] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 197.624925][T11084] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 197.632907][T11084] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 197.640915][T11084] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 197.648902][T11084] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 197.656886][T11084] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:48 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x10', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:48 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x78) 22:13:48 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x02\x00'}) 22:13:48 executing program 4 (fault-call:0 fault-nth:46): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:48 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x1000000000000}], 0x83) 22:13:48 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:48 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x01\x00'}) [ 197.980346][T11121] FAULT_INJECTION: forcing a failure. [ 197.980346][T11121] name failslab, interval 1, probability 0, space 0, times 0 [ 198.018973][T11121] CPU: 1 PID: 11121 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 198.027004][T11121] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.037072][T11121] Call Trace: [ 198.040388][T11121] dump_stack+0x172/0x1f0 [ 198.044754][T11121] should_fail.cold+0xa/0x15 [ 198.049369][T11121] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 198.055229][T11121] ? ___might_sleep+0x163/0x280 [ 198.060122][T11121] __should_failslab+0x121/0x190 [ 198.065084][T11121] should_failslab+0x9/0x14 [ 198.069596][T11121] kmem_cache_alloc_node_trace+0x270/0x720 [ 198.075422][T11121] __kmalloc_node+0x3d/0x70 [ 198.079940][T11121] kvmalloc_node+0x68/0x100 [ 198.084473][T11121] __list_lru_init+0x4a6/0x6e0 [ 198.089264][T11121] alloc_super+0x762/0x890 [ 198.093691][T11121] ? test_single_super+0x10/0x10 [ 198.098649][T11121] sget_userns+0xf1/0x560 [ 198.102989][T11121] ? kill_litter_super+0x60/0x60 [ 198.107938][T11121] ? test_single_super+0x10/0x10 [ 198.112884][T11121] ? kill_litter_super+0x60/0x60 [ 198.117831][T11121] sget+0x10c/0x150 [ 198.121653][T11121] mount_bdev+0xff/0x3c0 [ 198.125905][T11121] ? load_system_files+0x7620/0x7620 [ 198.131213][T11121] ntfs_mount+0x35/0x40 [ 198.135382][T11121] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 198.140943][T11121] legacy_get_tree+0xf2/0x200 [ 198.145633][T11121] vfs_get_tree+0x123/0x450 [ 198.150157][T11121] do_mount+0x1436/0x2c40 [ 198.154549][T11121] ? copy_mount_string+0x40/0x40 [ 198.159578][T11121] ? copy_mount_options+0x208/0x3a0 [ 198.164984][T11121] ? copy_mount_options+0x208/0x3a0 [ 198.170245][T11121] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.176637][T11121] ? copy_mount_options+0x280/0x3a0 [ 198.181894][T11121] ksys_mount+0xdb/0x150 [ 198.186268][T11121] __x64_sys_mount+0xbe/0x150 [ 198.191003][T11121] do_syscall_64+0x103/0x610 [ 198.195645][T11121] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.201571][T11121] RIP: 0033:0x45ad6a [ 198.205814][T11121] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 22:13:49 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x90) [ 198.226643][T11121] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 198.235211][T11121] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 198.243500][T11121] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 198.252227][T11121] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 198.260983][T11121] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 198.269103][T11121] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:49 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfsH', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 198.360342][T11126] __ntfs_error: 2 callbacks suppressed [ 198.360353][T11126] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:49 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x100000000000000}], 0x83) 22:13:49 executing program 4 (fault-call:0 fault-nth:47): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:49 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x02\x00'}) 22:13:49 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x20000303) [ 198.510903][T11126] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 198.523981][T11143] FAULT_INJECTION: forcing a failure. [ 198.523981][T11143] name failslab, interval 1, probability 0, space 0, times 0 [ 198.557589][T11143] CPU: 0 PID: 11143 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 198.565656][T11143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.575722][T11143] Call Trace: [ 198.579040][T11143] dump_stack+0x172/0x1f0 [ 198.583410][T11143] should_fail.cold+0xa/0x15 [ 198.588019][T11143] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 198.593881][T11143] ? ___might_sleep+0x163/0x280 [ 198.598759][T11143] __should_failslab+0x121/0x190 [ 198.603712][T11143] should_failslab+0x9/0x14 [ 198.608261][T11143] __kmalloc+0x2dc/0x740 [ 198.612526][T11143] ? __list_lru_init+0xd1/0x6e0 [ 198.617394][T11143] __list_lru_init+0xd1/0x6e0 [ 198.617416][T11143] alloc_super+0x762/0x890 [ 198.617432][T11143] ? test_single_super+0x10/0x10 [ 198.617448][T11143] sget_userns+0xf1/0x560 [ 198.617462][T11143] ? kill_litter_super+0x60/0x60 [ 198.617477][T11143] ? test_single_super+0x10/0x10 [ 198.617496][T11143] ? kill_litter_super+0x60/0x60 [ 198.626574][T11143] sget+0x10c/0x150 [ 198.626594][T11143] mount_bdev+0xff/0x3c0 [ 198.626609][T11143] ? load_system_files+0x7620/0x7620 [ 198.626627][T11143] ntfs_mount+0x35/0x40 [ 198.626643][T11143] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 198.626660][T11143] legacy_get_tree+0xf2/0x200 [ 198.626678][T11143] vfs_get_tree+0x123/0x450 [ 198.701315][T11143] do_mount+0x1436/0x2c40 [ 198.705674][T11143] ? copy_mount_string+0x40/0x40 [ 198.710639][T11143] ? _copy_from_user+0xdd/0x150 [ 198.715509][T11143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 198.721803][T11143] ? copy_mount_options+0x280/0x3a0 [ 198.727019][T11143] ksys_mount+0xdb/0x150 [ 198.731274][T11143] __x64_sys_mount+0xbe/0x150 [ 198.735970][T11143] do_syscall_64+0x103/0x610 [ 198.740578][T11143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 198.746476][T11143] RIP: 0033:0x45ad6a [ 198.750375][T11143] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 198.770523][T11143] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 198.778944][T11143] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 198.786927][T11143] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 198.794908][T11143] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 198.802887][T11143] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 22:13:49 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:49 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x03\x00'}) [ 198.810869][T11143] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:49 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x200000000000000}], 0x83) 22:13:49 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfsL', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:49 executing program 4 (fault-call:0 fault-nth:48): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:49 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000000c0)={r2, r3}) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000140)=&(0x7f0000000100)) [ 199.060471][T11160] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:50 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x04\x00'}) 22:13:50 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x300000000000000}], 0x83) 22:13:50 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs`', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 199.204997][T11170] FAULT_INJECTION: forcing a failure. [ 199.204997][T11170] name failslab, interval 1, probability 0, space 0, times 0 [ 199.258408][T11170] CPU: 0 PID: 11170 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 199.266438][T11170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.266444][T11170] Call Trace: [ 199.266471][T11170] dump_stack+0x172/0x1f0 [ 199.266495][T11170] should_fail.cold+0xa/0x15 [ 199.266517][T11170] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 199.266541][T11170] ? ___might_sleep+0x163/0x280 [ 199.279886][T11170] __should_failslab+0x121/0x190 [ 199.279903][T11170] should_failslab+0x9/0x14 [ 199.279918][T11170] kmem_cache_alloc_trace+0x2d1/0x760 [ 199.279937][T11170] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 199.279964][T11170] __memcg_init_list_lru_node+0x8a/0x1e0 [ 199.325677][T11170] __list_lru_init+0x3cf/0x6e0 [ 199.330450][T11170] alloc_super+0x762/0x890 [ 199.334868][T11170] ? test_single_super+0x10/0x10 [ 199.339832][T11170] sget_userns+0xf1/0x560 [ 199.344161][T11170] ? kill_litter_super+0x60/0x60 [ 199.349119][T11170] ? test_single_super+0x10/0x10 [ 199.354054][T11170] ? kill_litter_super+0x60/0x60 [ 199.359005][T11170] sget+0x10c/0x150 [ 199.362845][T11170] mount_bdev+0xff/0x3c0 [ 199.367089][T11170] ? load_system_files+0x7620/0x7620 [ 199.372377][T11170] ntfs_mount+0x35/0x40 [ 199.376536][T11170] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 199.382117][T11170] legacy_get_tree+0xf2/0x200 [ 199.386802][T11170] vfs_get_tree+0x123/0x450 [ 199.391414][T11170] do_mount+0x1436/0x2c40 [ 199.395791][T11170] ? copy_mount_string+0x40/0x40 [ 199.400735][T11170] ? _copy_from_user+0xdd/0x150 [ 199.405597][T11170] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 199.411839][T11170] ? copy_mount_options+0x280/0x3a0 [ 199.417052][T11170] ksys_mount+0xdb/0x150 [ 199.421298][T11170] __x64_sys_mount+0xbe/0x150 [ 199.425982][T11170] do_syscall_64+0x103/0x610 [ 199.430580][T11170] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 199.436472][T11170] RIP: 0033:0x45ad6a 22:13:50 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xc0', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 199.440373][T11170] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 199.459982][T11170] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 199.468399][T11170] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 199.476371][T11170] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 199.484343][T11170] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 199.492315][T11170] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 199.500286][T11170] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:50 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x4000000028003) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ubi_ctrl\x00', 0x90000, 0x0) mq_timedsend(r1, &(0x7f0000000300)="14ade8e3bd20a8c7d1981b1dfea96fc064ba66ee6acd606dd98fdcddf0230e57ac1c77e8d82c92445ea581e084f310f4532e89821b8d547f4c96d60a02f46cf53f0f07ab3ddbe9f3618139f361512719d339c8b6cebc3491b2743ee513d3ebda5da12cc339bda88a2b8cd4b42630f98d494475b323c5bbfbcba64bba4a2adeb4b1d74a31c84ac837237cd63d7f04", 0x8e, 0x20000000000000, &(0x7f00000003c0)={0x77359400}) r2 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000240)={r2, &(0x7f0000000140), &(0x7f0000000180)=""/159}, 0x18) r3 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x1, 0x0) ioctl$sock_bt_bnep_BNEPCONNDEL(r3, 0x400442c9, &(0x7f00000000c0)={0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x18) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r3, 0x40505412, &(0x7f0000000040)={0x3, 0xa87d, 0xcf, 0x0, 0x8}) 22:13:50 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x05\x00'}) 22:13:50 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x400000000000000}], 0x83) 22:13:50 executing program 4 (fault-call:0 fault-nth:49): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:50 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfsh', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:50 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x06\x00'}) 22:13:50 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:50 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x49, 0x40) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) [ 199.932292][T11203] FAULT_INJECTION: forcing a failure. [ 199.932292][T11203] name failslab, interval 1, probability 0, space 0, times 0 [ 199.958230][T11210] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 199.978125][T11203] CPU: 0 PID: 11203 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 199.986157][T11203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.996241][T11203] Call Trace: [ 199.999550][T11203] dump_stack+0x172/0x1f0 [ 200.003893][T11203] should_fail.cold+0xa/0x15 [ 200.008514][T11203] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 200.014331][T11203] ? ___might_sleep+0x163/0x280 [ 200.019189][T11203] __should_failslab+0x121/0x190 [ 200.024147][T11203] should_failslab+0x9/0x14 [ 200.028651][T11203] __kmalloc+0x2dc/0x740 [ 200.032903][T11203] ? __list_lru_init+0xd1/0x6e0 [ 200.037756][T11203] __list_lru_init+0xd1/0x6e0 [ 200.042441][T11203] alloc_super+0x762/0x890 [ 200.046862][T11203] ? test_single_super+0x10/0x10 [ 200.051799][T11203] sget_userns+0xf1/0x560 [ 200.056129][T11203] ? kill_litter_super+0x60/0x60 [ 200.061072][T11203] ? test_single_super+0x10/0x10 [ 200.066012][T11203] ? kill_litter_super+0x60/0x60 [ 200.070956][T11203] sget+0x10c/0x150 [ 200.074779][T11203] mount_bdev+0xff/0x3c0 [ 200.079028][T11203] ? load_system_files+0x7620/0x7620 [ 200.084322][T11203] ntfs_mount+0x35/0x40 [ 200.088486][T11203] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 200.094050][T11203] legacy_get_tree+0xf2/0x200 [ 200.098746][T11203] vfs_get_tree+0x123/0x450 [ 200.103253][T11203] do_mount+0x1436/0x2c40 [ 200.107595][T11203] ? copy_mount_string+0x40/0x40 [ 200.112542][T11203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.118783][T11203] ? copy_mount_options+0x280/0x3a0 [ 200.123988][T11203] ksys_mount+0xdb/0x150 [ 200.128253][T11203] __x64_sys_mount+0xbe/0x150 [ 200.132940][T11203] do_syscall_64+0x103/0x610 [ 200.137544][T11203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.143440][T11203] RIP: 0033:0x45ad6a [ 200.147336][T11203] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 200.166941][T11203] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 200.175359][T11203] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a 22:13:51 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\a\x00'}) 22:13:51 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x500000000000000}], 0x83) [ 200.183331][T11203] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 200.191324][T11203] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 200.199292][T11203] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 200.207263][T11203] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:51 executing program 4 (fault-call:0 fault-nth:50): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:51 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00?\x00'}) 22:13:51 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:51 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:13:51 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfsl', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 200.436884][T11234] FAULT_INJECTION: forcing a failure. [ 200.436884][T11234] name failslab, interval 1, probability 0, space 0, times 0 [ 200.439737][T11232] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 200.474504][T11234] CPU: 1 PID: 11234 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 200.482532][T11234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.492588][T11234] Call Trace: [ 200.495897][T11234] dump_stack+0x172/0x1f0 [ 200.500253][T11234] should_fail.cold+0xa/0x15 [ 200.504854][T11234] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 200.510674][T11234] ? ___might_sleep+0x163/0x280 [ 200.515540][T11234] __should_failslab+0x121/0x190 [ 200.520481][T11234] should_failslab+0x9/0x14 [ 200.524994][T11234] kmem_cache_alloc_trace+0x2d1/0x760 [ 200.530372][T11234] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 200.536188][T11234] __memcg_init_list_lru_node+0x8a/0x1e0 [ 200.541842][T11234] __list_lru_init+0x3cf/0x6e0 [ 200.546617][T11234] alloc_super+0x762/0x890 [ 200.551039][T11234] ? test_single_super+0x10/0x10 [ 200.555984][T11234] sget_userns+0xf1/0x560 [ 200.560318][T11234] ? kill_litter_super+0x60/0x60 [ 200.565261][T11234] ? test_single_super+0x10/0x10 [ 200.570204][T11234] ? kill_litter_super+0x60/0x60 [ 200.575149][T11234] sget+0x10c/0x150 [ 200.578966][T11234] mount_bdev+0xff/0x3c0 [ 200.583215][T11234] ? load_system_files+0x7620/0x7620 [ 200.588506][T11234] ntfs_mount+0x35/0x40 [ 200.592665][T11234] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 200.598224][T11234] legacy_get_tree+0xf2/0x200 [ 200.602908][T11234] vfs_get_tree+0x123/0x450 [ 200.607416][T11234] do_mount+0x1436/0x2c40 [ 200.611755][T11234] ? copy_mount_string+0x40/0x40 [ 200.616713][T11234] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 200.622951][T11234] ? copy_mount_options+0x280/0x3a0 [ 200.628159][T11234] ksys_mount+0xdb/0x150 [ 200.632407][T11234] __x64_sys_mount+0xbe/0x150 [ 200.637090][T11234] do_syscall_64+0x103/0x610 [ 200.641725][T11234] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 200.647615][T11234] RIP: 0033:0x45ad6a [ 200.651517][T11234] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 200.671155][T11234] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 200.679582][T11234] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a 22:13:51 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x1100000000000000}], 0x83) 22:13:51 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00@\x00'}) [ 200.687555][T11234] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 200.695526][T11234] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 200.703498][T11234] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 200.719378][T11234] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:51 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x200, 0x0) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000180)={{&(0x7f00000000c0)=""/110, 0x6e}, &(0x7f0000000140), 0x4de6e14c2217655f}, 0x20) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000040)={0x100000000, 0x10a, "cac8404ba5e6cd524872f57f4aeba37b2c8f4e3c9885273aaa121ae8ff21b97a", 0x0, 0x8ad8, 0x8, 0x6, 0x40}) 22:13:51 executing program 4 (fault-call:0 fault-nth:51): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 200.959763][T11232] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 201.005567][T11253] QAT: Invalid ioctl 22:13:51 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfst', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:51 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x1200000000000000}], 0x83) 22:13:51 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:51 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 201.166360][T11251] QAT: Invalid ioctl [ 201.196822][T11259] FAULT_INJECTION: forcing a failure. [ 201.196822][T11259] name failslab, interval 1, probability 0, space 0, times 0 [ 201.223795][T11259] CPU: 0 PID: 11259 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 201.231891][T11259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.241947][T11259] Call Trace: [ 201.245259][T11259] dump_stack+0x172/0x1f0 [ 201.249690][T11259] should_fail.cold+0xa/0x15 [ 201.254298][T11259] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 201.260113][T11259] ? ___might_sleep+0x163/0x280 [ 201.264974][T11259] __should_failslab+0x121/0x190 [ 201.269969][T11259] should_failslab+0x9/0x14 [ 201.274484][T11259] kmem_cache_alloc_trace+0x2d1/0x760 [ 201.279862][T11259] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 201.285682][T11259] __memcg_init_list_lru_node+0x8a/0x1e0 [ 201.291322][T11259] __list_lru_init+0x3cf/0x6e0 [ 201.296091][T11259] alloc_super+0x762/0x890 [ 201.300513][T11259] ? test_single_super+0x10/0x10 [ 201.305451][T11259] sget_userns+0xf1/0x560 [ 201.309780][T11259] ? kill_litter_super+0x60/0x60 [ 201.314718][T11259] ? test_single_super+0x10/0x10 [ 201.319657][T11259] ? kill_litter_super+0x60/0x60 [ 201.324592][T11259] sget+0x10c/0x150 [ 201.328407][T11259] mount_bdev+0xff/0x3c0 [ 201.332654][T11259] ? load_system_files+0x7620/0x7620 [ 201.337947][T11259] ntfs_mount+0x35/0x40 [ 201.342109][T11259] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 201.347657][T11259] legacy_get_tree+0xf2/0x200 [ 201.352344][T11259] vfs_get_tree+0x123/0x450 [ 201.356852][T11259] do_mount+0x1436/0x2c40 [ 201.361192][T11259] ? copy_mount_string+0x40/0x40 [ 201.366151][T11259] ? _copy_from_user+0xdd/0x150 [ 201.371009][T11259] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.377250][T11259] ? copy_mount_options+0x280/0x3a0 [ 201.382457][T11259] ksys_mount+0xdb/0x150 [ 201.386704][T11259] __x64_sys_mount+0xbe/0x150 [ 201.391393][T11259] do_syscall_64+0x103/0x610 [ 201.395995][T11259] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.401885][T11259] RIP: 0033:0x45ad6a [ 201.405814][T11259] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 201.425429][T11259] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 201.433858][T11259] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a 22:13:52 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 201.441948][T11259] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 201.449928][T11259] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 201.457912][T11259] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 201.465888][T11259] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:52 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfsz', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 201.499991][T11270] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:52 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="07020b000000010000b8e66a78012a93079920df120e72d19d7cfe6c2dbc79f13ef59748c2c48769abcabb0253a8f51eb065659ad7f17463be335020a1429efd9278c411d72b4975c1bfc75a309fcf971fb41abbf7f36994bd114ad4aaa8cbf993c5ea1b263eb0fa752e7c30f1be9d565ee1b2c10de7a29dc7aa3dde7c2f0f53e70247744b9ddaa9e6a80730ef7832abbde07bf5459ada69d603d6255701ad3ec24cad7189100b564d2d5babd51216a8bf93"], 0xc2, 0x2) pipe(&(0x7f0000000140)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x841200a}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0x6c, r2, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7e}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9f}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x81}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x80}, 0x800) 22:13:52 executing program 4 (fault-call:0 fault-nth:52): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:52 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x1400000000000000}], 0x83) 22:13:52 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 201.635447][T11270] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 201.671797][T11283] FAULT_INJECTION: forcing a failure. [ 201.671797][T11283] name failslab, interval 1, probability 0, space 0, times 0 [ 201.712780][T11283] CPU: 0 PID: 11283 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 201.720839][T11283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.730905][T11283] Call Trace: [ 201.734235][T11283] dump_stack+0x172/0x1f0 [ 201.738586][T11283] should_fail.cold+0xa/0x15 [ 201.743194][T11283] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 201.749222][T11283] ? ___might_sleep+0x163/0x280 [ 201.754085][T11283] __should_failslab+0x121/0x190 [ 201.760604][T11283] should_failslab+0x9/0x14 [ 201.765117][T11283] kmem_cache_alloc_trace+0x2d1/0x760 [ 201.770504][T11283] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 201.776323][T11283] __memcg_init_list_lru_node+0x8a/0x1e0 [ 201.781971][T11283] __list_lru_init+0x3cf/0x6e0 [ 201.786748][T11283] alloc_super+0x762/0x890 [ 201.791173][T11283] ? test_single_super+0x10/0x10 [ 201.796126][T11283] sget_userns+0xf1/0x560 [ 201.800461][T11283] ? kill_litter_super+0x60/0x60 [ 201.805407][T11283] ? test_single_super+0x10/0x10 [ 201.810351][T11283] ? kill_litter_super+0x60/0x60 [ 201.815294][T11283] sget+0x10c/0x150 [ 201.819113][T11283] mount_bdev+0xff/0x3c0 [ 201.823361][T11283] ? load_system_files+0x7620/0x7620 [ 201.828659][T11283] ntfs_mount+0x35/0x40 [ 201.832825][T11283] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 201.838388][T11283] legacy_get_tree+0xf2/0x200 [ 201.843082][T11283] vfs_get_tree+0x123/0x450 [ 201.847595][T11283] do_mount+0x1436/0x2c40 [ 201.851945][T11283] ? copy_mount_string+0x40/0x40 [ 201.856898][T11283] ? _copy_from_user+0xdd/0x150 [ 201.861759][T11283] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 201.868007][T11283] ? copy_mount_options+0x280/0x3a0 [ 201.873235][T11283] ksys_mount+0xdb/0x150 [ 201.877489][T11283] __x64_sys_mount+0xbe/0x150 [ 201.882175][T11283] do_syscall_64+0x103/0x610 [ 201.886791][T11283] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 201.892684][T11283] RIP: 0033:0x45ad6a [ 201.896581][T11283] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 201.916206][T11283] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 201.924638][T11283] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 201.932625][T11283] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 201.940609][T11283] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 201.948586][T11283] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 22:13:52 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 201.956565][T11283] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:52 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:52 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x1500000000000000}], 0x83) 22:13:52 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000001580)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001480)=[{&(0x7f0000000100)="ec09dd2926c38d15a848c077a05b7bcedf01b4825d4bbd8c028826dbbfd67d", 0x1f}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000000140)="1625cd72ac518e2ad035d55f637626e82538fadbbf86e274de731e7bd762c312bd6fe9efc94869959f08f0bbb11e2c35e80ea37e73e64eb92d4959b35ba95373026ab7eadd5069ca694d8178b90b691acef7f7f98d7c1dfb2564c7f04a9beef1379dac757710efec", 0x68}, {&(0x7f00000001c0)="fe91c8c1bf373eb0c59e2a4099be5967ef7ca0b43616094f5a3954afa92fec0158ef9f918eedff38217e36f2fb", 0x2d}, {&(0x7f0000001300)="b9883f5d7ccbca87baf3d9dcafaeccfa08a685f8a914fa3a6e40ebb2f5260e2eaa45fe9790b4ad7058fcee1e70e65ed4c08987e51a9c690ac0235e07851acc5cb16fdb238a128e0172955bab43f0b22d8c3d54c04b0f7aa7c6c89b954c55049074476a438ac9fdf37f93e734b63eb2d9ab7495f280a602cdf97a2906084c54bd7bece265f8b14fdc33bab698f397f3cd9529d01f3824999fdf4992fb76cbb894ad215e25", 0xa4}, {&(0x7f00000013c0)="43d5e25dd70c6267dd7d38b278af4cad215f3cce9d954c95d93c28c8001efe3cc00913a1cd746c689d7beff3d6a53bc453fd9a02fe26e3c68ae88c55213bf27dc51950367ef00bb2dae01a3314949c6d4f730eb7cecf86dd49af035116099aca857cb11acfdfb1af22121cda27ffeda6a7ffb391ab29ff27caa34145ba1314b95314d9403e2ab252d34e0222b82e21f669800c80c6ace76886a0d108549d590b916bc67aa27a4feed3704580d90d0d4a0721eba9", 0xb4}, {&(0x7f0000000200)="01c37a637d5be19da542b0575a07f38a4cb21af14573db1f69625c2b", 0x1c}, {&(0x7f0000000240)="9aa67ab03dc6695320dded1b95855d9d", 0x10}], 0x8, &(0x7f0000001500)=[@rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}], 0x50, 0x800}, 0x4004000) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x105800, 0x0) 22:13:53 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:53 executing program 4 (fault-call:0 fault-nth:53): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 202.142333][T11297] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:53 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:53 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x1600000000000000}], 0x83) 22:13:53 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{0x0, 0x7530}, 0x14, 0xffffffffffffff09, 0x200000000000000}], 0x18) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) 22:13:53 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 202.335567][T11308] FAULT_INJECTION: forcing a failure. [ 202.335567][T11308] name failslab, interval 1, probability 0, space 0, times 0 [ 202.361257][T11313] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:13:53 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 202.384276][T11308] CPU: 1 PID: 11308 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 202.392318][T11308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.402393][T11308] Call Trace: [ 202.405730][T11308] dump_stack+0x172/0x1f0 [ 202.410317][T11308] should_fail.cold+0xa/0x15 [ 202.414954][T11308] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 202.421137][T11308] ? ___might_sleep+0x163/0x280 [ 202.426023][T11308] __should_failslab+0x121/0x190 [ 202.431007][T11308] should_failslab+0x9/0x14 [ 202.435540][T11308] kmem_cache_alloc_node_trace+0x270/0x720 [ 202.441405][T11308] ? kmem_cache_alloc_trace+0x354/0x760 [ 202.447105][T11308] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 202.452942][T11308] __kmalloc_node+0x3d/0x70 [ 202.457474][T11308] kvmalloc_node+0x68/0x100 [ 202.462000][T11308] __list_lru_init+0x4a6/0x6e0 [ 202.466782][T11308] alloc_super+0x762/0x890 [ 202.471241][T11308] ? test_single_super+0x10/0x10 [ 202.476191][T11308] sget_userns+0xf1/0x560 [ 202.480540][T11308] ? kill_litter_super+0x60/0x60 [ 202.485485][T11308] ? test_single_super+0x10/0x10 [ 202.490451][T11308] ? kill_litter_super+0x60/0x60 [ 202.495391][T11308] sget+0x10c/0x150 [ 202.499220][T11308] mount_bdev+0xff/0x3c0 [ 202.503466][T11308] ? load_system_files+0x7620/0x7620 [ 202.508762][T11308] ntfs_mount+0x35/0x40 [ 202.512933][T11308] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 202.518513][T11308] legacy_get_tree+0xf2/0x200 [ 202.523222][T11308] vfs_get_tree+0x123/0x450 [ 202.527746][T11308] do_mount+0x1436/0x2c40 [ 202.532098][T11308] ? copy_mount_string+0x40/0x40 [ 202.537048][T11308] ? copy_mount_options+0x1ea/0x3a0 [ 202.542256][T11308] ? copy_mount_options+0x1f0/0x3a0 [ 202.547463][T11308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.553716][T11308] ? copy_mount_options+0x280/0x3a0 [ 202.558928][T11308] ksys_mount+0xdb/0x150 [ 202.563187][T11308] __x64_sys_mount+0xbe/0x150 [ 202.567891][T11308] do_syscall_64+0x103/0x610 [ 202.572497][T11308] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.578395][T11308] RIP: 0033:0x45ad6a [ 202.582296][T11308] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 202.601912][T11308] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 202.610339][T11308] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 202.618348][T11308] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 202.626333][T11308] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 202.634322][T11308] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 202.642302][T11308] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:53 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x1f00000000000000}], 0x83) 22:13:53 executing program 4 (fault-call:0 fault-nth:54): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:53 executing program 2: write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r0 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0x6, 0x80) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000300)) clock_gettime(0x0, &(0x7f0000000340)) select(0x40, &(0x7f0000000140)={0x0, 0x9, 0x100000000, 0x100000000000, 0xa3, 0x0, 0x718a, 0x41f3}, &(0x7f0000000180)={0x2aea, 0x8, 0x7, 0x79e, 0x1b, 0x7, 0x9, 0x10000}, &(0x7f00000001c0)={0xa06e, 0x9cf, 0x5, 0x40000000001, 0x105, 0x9, 0x81, 0x6}, &(0x7f0000000240)={0x0, 0x2710}) r1 = msgget(0x1, 0x20) msgrcv(r1, &(0x7f0000000000)={0x0, ""/254}, 0x106, 0x3, 0x2800) 22:13:53 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:53 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 202.849826][T11333] FAULT_INJECTION: forcing a failure. [ 202.849826][T11333] name failslab, interval 1, probability 0, space 0, times 0 [ 202.883624][T11333] CPU: 1 PID: 11333 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 22:13:53 executing program 2: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) [ 202.892158][T11333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.892165][T11333] Call Trace: [ 202.892211][T11333] dump_stack+0x172/0x1f0 [ 202.909901][T11333] should_fail.cold+0xa/0x15 [ 202.909922][T11333] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 202.909944][T11333] ? ___might_sleep+0x163/0x280 [ 202.909964][T11333] __should_failslab+0x121/0x190 [ 202.909980][T11333] should_failslab+0x9/0x14 [ 202.909997][T11333] kmem_cache_alloc_trace+0x2d1/0x760 [ 202.910017][T11333] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 202.910041][T11333] __memcg_init_list_lru_node+0x8a/0x1e0 [ 202.910061][T11333] __list_lru_init+0x3cf/0x6e0 [ 202.910082][T11333] alloc_super+0x762/0x890 [ 202.910098][T11333] ? test_single_super+0x10/0x10 [ 202.910114][T11333] sget_userns+0xf1/0x560 [ 202.910128][T11333] ? kill_litter_super+0x60/0x60 [ 202.910145][T11333] ? test_single_super+0x10/0x10 [ 202.910158][T11333] ? kill_litter_super+0x60/0x60 [ 202.910171][T11333] sget+0x10c/0x150 [ 202.910190][T11333] mount_bdev+0xff/0x3c0 [ 202.910216][T11333] ? load_system_files+0x7620/0x7620 [ 202.910235][T11333] ntfs_mount+0x35/0x40 [ 202.910250][T11333] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 202.910269][T11333] legacy_get_tree+0xf2/0x200 [ 202.910287][T11333] vfs_get_tree+0x123/0x450 [ 202.910305][T11333] do_mount+0x1436/0x2c40 [ 202.910327][T11333] ? copy_mount_string+0x40/0x40 [ 202.910349][T11333] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 202.910363][T11333] ? copy_mount_options+0x280/0x3a0 [ 202.910381][T11333] ksys_mount+0xdb/0x150 [ 202.910397][T11333] __x64_sys_mount+0xbe/0x150 [ 202.910417][T11333] do_syscall_64+0x103/0x610 [ 202.910437][T11333] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 202.910449][T11333] RIP: 0033:0x45ad6a [ 202.910464][T11333] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 202.910480][T11333] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 203.089095][T11333] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a 22:13:54 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 203.097080][T11333] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 203.105062][T11333] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 203.113042][T11333] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 203.121021][T11333] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:54 executing program 4 (fault-call:0 fault-nth:55): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x3f00000000000000}], 0x83) 22:13:54 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 203.375030][T11348] __ntfs_error: 4 callbacks suppressed [ 203.375040][T11348] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 203.399421][T11360] FAULT_INJECTION: forcing a failure. [ 203.399421][T11360] name failslab, interval 1, probability 0, space 0, times 0 22:13:54 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) uname(&(0x7f0000000000)=""/253) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) [ 203.430995][T11345] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 203.465569][T11360] CPU: 0 PID: 11360 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 203.473603][T11360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.483673][T11360] Call Trace: [ 203.486979][T11360] dump_stack+0x172/0x1f0 [ 203.491326][T11360] should_fail.cold+0xa/0x15 [ 203.495933][T11360] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 203.501764][T11360] ? ___might_sleep+0x163/0x280 [ 203.506637][T11360] __should_failslab+0x121/0x190 [ 203.511600][T11360] should_failslab+0x9/0x14 [ 203.516107][T11360] kmem_cache_alloc_trace+0x2d1/0x760 [ 203.521489][T11360] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 203.527310][T11360] __memcg_init_list_lru_node+0x8a/0x1e0 [ 203.532956][T11360] __list_lru_init+0x3cf/0x6e0 [ 203.537734][T11360] alloc_super+0x762/0x890 [ 203.542162][T11360] ? test_single_super+0x10/0x10 [ 203.547127][T11360] sget_userns+0xf1/0x560 [ 203.551463][T11360] ? kill_litter_super+0x60/0x60 [ 203.556410][T11360] ? test_single_super+0x10/0x10 [ 203.561351][T11360] ? kill_litter_super+0x60/0x60 [ 203.566292][T11360] sget+0x10c/0x150 [ 203.570109][T11360] mount_bdev+0xff/0x3c0 [ 203.574352][T11360] ? load_system_files+0x7620/0x7620 [ 203.579645][T11360] ntfs_mount+0x35/0x40 [ 203.583808][T11360] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 203.589364][T11360] legacy_get_tree+0xf2/0x200 [ 203.594045][T11360] vfs_get_tree+0x123/0x450 [ 203.598580][T11360] do_mount+0x1436/0x2c40 [ 203.602925][T11360] ? copy_mount_string+0x40/0x40 [ 203.607877][T11360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 203.614125][T11360] ? copy_mount_options+0x280/0x3a0 [ 203.619334][T11360] ksys_mount+0xdb/0x150 [ 203.623586][T11360] __x64_sys_mount+0xbe/0x150 [ 203.628274][T11360] do_syscall_64+0x103/0x610 [ 203.632870][T11360] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 203.638767][T11360] RIP: 0033:0x45ad6a [ 203.642669][T11360] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 203.662281][T11360] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 203.670702][T11360] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a 22:13:54 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:54 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 203.678679][T11360] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 203.686653][T11360] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 203.694630][T11360] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 203.702614][T11360] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:54 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:54 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0xfa00000000000000}], 0x83) 22:13:54 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:13:54 executing program 4 (fault-call:0 fault-nth:56): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 203.971566][T11374] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 203.983455][T11380] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:13:54 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\xff'}) 22:13:54 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280), 0x0) 22:13:55 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:55 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x18) [ 204.132309][T11380] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 204.161552][T11387] FAULT_INJECTION: forcing a failure. [ 204.161552][T11387] name failslab, interval 1, probability 0, space 0, times 0 [ 204.219512][T11387] CPU: 0 PID: 11387 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 204.227556][T11387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.237628][T11387] Call Trace: [ 204.240940][T11387] dump_stack+0x172/0x1f0 [ 204.245286][T11387] should_fail.cold+0xa/0x15 [ 204.249897][T11387] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 204.255810][T11387] ? ___might_sleep+0x163/0x280 [ 204.260673][T11387] __should_failslab+0x121/0x190 [ 204.265620][T11387] should_failslab+0x9/0x14 [ 204.270132][T11387] kmem_cache_alloc_node_trace+0x270/0x720 [ 204.275943][T11387] ? kmem_cache_alloc_trace+0x354/0x760 [ 204.281497][T11387] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 204.287317][T11387] __kmalloc_node+0x3d/0x70 [ 204.291831][T11387] kvmalloc_node+0x68/0x100 [ 204.296340][T11387] __list_lru_init+0x4a6/0x6e0 [ 204.301116][T11387] alloc_super+0x762/0x890 [ 204.305542][T11387] ? test_single_super+0x10/0x10 [ 204.310487][T11387] sget_userns+0xf1/0x560 [ 204.314818][T11387] ? kill_litter_super+0x60/0x60 [ 204.319765][T11387] ? test_single_super+0x10/0x10 [ 204.324706][T11387] ? kill_litter_super+0x60/0x60 [ 204.329650][T11387] sget+0x10c/0x150 [ 204.333469][T11387] mount_bdev+0xff/0x3c0 [ 204.337739][T11387] ? load_system_files+0x7620/0x7620 [ 204.343036][T11387] ntfs_mount+0x35/0x40 [ 204.347205][T11387] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 204.352767][T11387] legacy_get_tree+0xf2/0x200 [ 204.357456][T11387] vfs_get_tree+0x123/0x450 [ 204.361966][T11387] do_mount+0x1436/0x2c40 [ 204.366312][T11387] ? copy_mount_string+0x40/0x40 [ 204.371283][T11387] ? _copy_from_user+0xdd/0x150 [ 204.376165][T11387] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.382425][T11387] ? copy_mount_options+0x280/0x3a0 [ 204.387634][T11387] ksys_mount+0xdb/0x150 [ 204.391891][T11387] __x64_sys_mount+0xbe/0x150 [ 204.396587][T11387] do_syscall_64+0x103/0x610 [ 204.401232][T11387] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.407152][T11387] RIP: 0033:0x45ad6a [ 204.411081][T11387] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 204.430693][T11387] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 204.439117][T11387] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 204.447094][T11387] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 204.455072][T11387] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 22:13:55 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x02\x00'}) [ 204.463045][T11387] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 204.471016][T11387] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:55 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:55 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x147fe, 0x0) r3 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0xa6000000, 0x40001) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x800000000010003, 0x0) r5 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x1, 0x44000) r6 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x20040, 0x0) r7 = dup3(r0, r0, 0x80000) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000340)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="90000000", @ANYRES16=r1, @ANYBLOB="050726bd7000ffdbdf25020000000c0008009e540000000000000c0003001f000000000000000c00080004000000000000000c00040000100000000000000c00060000000000000000000c000300ea900000000000003400070008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r4, @ANYBLOB='\b\a\x00\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=r7], 0x90}, 0x1, 0x0, 0x0, 0x810}, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r6, 0x84, 0x16, &(0x7f0000000080)={0x7, [0x6, 0x7, 0x4, 0x4, 0x1b2, 0xda6, 0x1f]}, &(0x7f00000001c0)=0x12) 22:13:55 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x03\x00'}) 22:13:55 executing program 4 (fault-call:0 fault-nth:57): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 204.626837][T11401] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:55 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x30) [ 204.685403][T11414] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 204.694557][T11412] FAULT_INJECTION: forcing a failure. [ 204.694557][T11412] name failslab, interval 1, probability 0, space 0, times 0 [ 204.727819][T11412] CPU: 0 PID: 11412 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 204.736151][T11412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.746244][T11412] Call Trace: [ 204.749557][T11412] dump_stack+0x172/0x1f0 [ 204.753906][T11412] should_fail.cold+0xa/0x15 [ 204.758977][T11412] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 204.764881][T11412] ? ___might_sleep+0x163/0x280 [ 204.769745][T11412] __should_failslab+0x121/0x190 [ 204.774695][T11412] should_failslab+0x9/0x14 [ 204.779228][T11412] kmem_cache_alloc_trace+0x2d1/0x760 [ 204.784619][T11412] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 204.790448][T11412] __memcg_init_list_lru_node+0x8a/0x1e0 [ 204.796101][T11412] __list_lru_init+0x3cf/0x6e0 [ 204.801152][T11412] alloc_super+0x762/0x890 [ 204.805601][T11412] ? test_single_super+0x10/0x10 [ 204.810796][T11412] sget_userns+0xf1/0x560 [ 204.815193][T11412] ? kill_litter_super+0x60/0x60 [ 204.820362][T11412] ? test_single_super+0x10/0x10 [ 204.825492][T11412] ? kill_litter_super+0x60/0x60 [ 204.830589][T11412] sget+0x10c/0x150 [ 204.834533][T11412] mount_bdev+0xff/0x3c0 [ 204.839250][T11412] ? load_system_files+0x7620/0x7620 [ 204.844946][T11412] ntfs_mount+0x35/0x40 [ 204.849448][T11412] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 204.855069][T11412] legacy_get_tree+0xf2/0x200 [ 204.860081][T11412] vfs_get_tree+0x123/0x450 [ 204.864620][T11412] do_mount+0x1436/0x2c40 [ 204.869077][T11412] ? copy_mount_string+0x40/0x40 [ 204.874050][T11412] ? _copy_from_user+0xdd/0x150 [ 204.878946][T11412] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 204.885290][T11412] ? copy_mount_options+0x280/0x3a0 [ 204.891266][T11412] ksys_mount+0xdb/0x150 [ 204.895529][T11412] __x64_sys_mount+0xbe/0x150 [ 204.901058][T11412] do_syscall_64+0x103/0x610 [ 204.905683][T11412] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 204.911585][T11412] RIP: 0033:0x45ad6a [ 204.915485][T11412] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 204.935097][T11412] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 204.943521][T11412] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 204.951505][T11412] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 204.959479][T11412] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 204.967453][T11412] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 204.975430][T11412] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:55 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x04\x00'}) 22:13:55 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:55 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2, 0x3}], 0x18) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)={0x2, 0x2000}) 22:13:56 executing program 4 (fault-call:0 fault-nth:58): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:56 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:56 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x48) [ 205.154789][T11429] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:56 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x05\x00'}) [ 205.258669][T11433] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 205.272114][T11429] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:13:56 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) syz_init_net_socket$ax25(0x3, 0x7, 0xc4) [ 205.338170][T11435] FAULT_INJECTION: forcing a failure. [ 205.338170][T11435] name failslab, interval 1, probability 0, space 0, times 0 [ 205.383017][T11435] CPU: 1 PID: 11435 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 205.402992][T11435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.426775][T11435] Call Trace: [ 205.432347][T11435] dump_stack+0x172/0x1f0 [ 205.438136][T11435] should_fail.cold+0xa/0x15 [ 205.445975][T11435] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 205.454817][T11435] ? ___might_sleep+0x163/0x280 [ 205.463873][T11435] __should_failslab+0x121/0x190 [ 205.469108][T11435] should_failslab+0x9/0x14 [ 205.475338][T11435] kmem_cache_alloc_trace+0x2d1/0x760 [ 205.480979][T11435] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 205.486940][T11435] __memcg_init_list_lru_node+0x8a/0x1e0 [ 205.493270][T11435] __list_lru_init+0x3cf/0x6e0 [ 205.498448][T11435] alloc_super+0x762/0x890 [ 205.503402][T11435] ? test_single_super+0x10/0x10 [ 205.509505][T11435] sget_userns+0xf1/0x560 [ 205.514050][T11435] ? kill_litter_super+0x60/0x60 [ 205.519170][T11435] ? test_single_super+0x10/0x10 [ 205.525119][T11435] ? kill_litter_super+0x60/0x60 [ 205.531262][T11435] sget+0x10c/0x150 [ 205.535122][T11435] mount_bdev+0xff/0x3c0 [ 205.540033][T11435] ? load_system_files+0x7620/0x7620 [ 205.547760][T11435] ntfs_mount+0x35/0x40 [ 205.552316][T11435] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 205.558227][T11435] legacy_get_tree+0xf2/0x200 [ 205.563126][T11435] vfs_get_tree+0x123/0x450 [ 205.568464][T11435] do_mount+0x1436/0x2c40 [ 205.573307][T11435] ? copy_mount_string+0x40/0x40 [ 205.578821][T11435] ? _copy_from_user+0xdd/0x150 [ 205.585127][T11435] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 205.598143][T11435] ? copy_mount_options+0x280/0x3a0 [ 205.606586][T11435] ksys_mount+0xdb/0x150 [ 205.616705][T11435] __x64_sys_mount+0xbe/0x150 [ 205.626126][T11435] do_syscall_64+0x103/0x610 [ 205.630900][T11435] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 205.638343][T11435] RIP: 0033:0x45ad6a [ 205.642700][T11435] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 205.669002][T11435] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 205.677891][T11435] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 205.687207][T11435] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 205.707120][T11435] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 205.720282][T11435] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 22:13:56 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x06\x00'}) 22:13:56 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 205.731629][T11435] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:56 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x60) 22:13:56 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\a\x00'}) 22:13:56 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0xc, 0x0, 0x0) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:13:56 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:56 executing program 4 (fault-call:0 fault-nth:59): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:56 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x03\x00'}) 22:13:56 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x78) 22:13:56 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x1) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x0) write$binfmt_aout(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="0004060b0bb20550829b380000001607a90f3d2ed90920515e827507000000162d0000518cdf6d1e4c33bb98394c9f723d7ae5cd930dfd9ca9230052b7eba90fb500004f3636219433040089cb003b2c040000710e13"], 0x46) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0xfffffffffffffffe}) read(r2, &(0x7f00000005c0)=""/231, 0x1da) r3 = syz_open_pts(r2, 0x0) r4 = dup2(r3, r2) r5 = getpgid(0x0) recvmsg$kcm(r1, &(0x7f00000001c0)={&(0x7f0000000100)=@ax25={{}, [@default, @default, @rose, @netrom, @default, @netrom, @remote, @rose]}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000380)=""/219, 0xdb}, {&(0x7f0000000480)=""/168, 0xa8}, {&(0x7f00000006c0)=""/208, 0xd0}, {&(0x7f00000007c0)=""/4096, 0xfffffc4d}], 0x4, &(0x7f00000017c0)=""/188, 0xbc}, 0x40010000) write$FUSE_LK(r1, &(0x7f0000000080)={0x28, 0x0, 0x6, {{0x1, 0x40, 0x0, r5}}}, 0x28) ioctl$KDADDIO(r4, 0x4b34, 0x9) ioctl$TCXONC(r4, 0x540a, 0x3) r6 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r6, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) openat$uhid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uhid\x00', 0x2, 0x0) sync_file_range(r6, 0x0, 0x9, 0x5) 22:13:56 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 206.069474][T11468] FAULT_INJECTION: forcing a failure. [ 206.069474][T11468] name failslab, interval 1, probability 0, space 0, times 0 [ 206.126736][T11468] CPU: 1 PID: 11468 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 206.134779][T11468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.144849][T11468] Call Trace: [ 206.148165][T11468] dump_stack+0x172/0x1f0 [ 206.152522][T11468] should_fail.cold+0xa/0x15 [ 206.157120][T11468] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 206.162935][T11468] ? ___might_sleep+0x163/0x280 [ 206.167800][T11468] __should_failslab+0x121/0x190 [ 206.172746][T11468] should_failslab+0x9/0x14 [ 206.177258][T11468] kmem_cache_alloc_trace+0x2d1/0x760 [ 206.182645][T11468] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 206.188468][T11468] __memcg_init_list_lru_node+0x8a/0x1e0 [ 206.194116][T11468] __list_lru_init+0x3cf/0x6e0 [ 206.198891][T11468] alloc_super+0x762/0x890 [ 206.203316][T11468] ? test_single_super+0x10/0x10 [ 206.208260][T11468] sget_userns+0xf1/0x560 [ 206.212605][T11468] ? kill_litter_super+0x60/0x60 [ 206.217551][T11468] ? test_single_super+0x10/0x10 [ 206.222503][T11468] ? kill_litter_super+0x60/0x60 [ 206.227464][T11468] sget+0x10c/0x150 [ 206.231289][T11468] mount_bdev+0xff/0x3c0 [ 206.235537][T11468] ? load_system_files+0x7620/0x7620 [ 206.240836][T11468] ntfs_mount+0x35/0x40 [ 206.245006][T11468] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 206.250560][T11468] legacy_get_tree+0xf2/0x200 [ 206.255768][T11468] vfs_get_tree+0x123/0x450 [ 206.260278][T11468] do_mount+0x1436/0x2c40 [ 206.264623][T11468] ? copy_mount_string+0x40/0x40 [ 206.269570][T11468] ? _copy_from_user+0xdd/0x150 [ 206.274428][T11468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.280670][T11468] ? copy_mount_options+0x280/0x3a0 [ 206.285883][T11468] ksys_mount+0xdb/0x150 [ 206.290133][T11468] __x64_sys_mount+0xbe/0x150 [ 206.294821][T11468] do_syscall_64+0x103/0x610 [ 206.299430][T11468] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.305335][T11468] RIP: 0033:0x45ad6a [ 206.309245][T11468] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 206.328855][T11468] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 206.337306][T11468] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 206.345305][T11468] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 206.353286][T11468] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 206.361288][T11468] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 206.369270][T11468] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:57 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x05\x00'}) 22:13:57 executing program 4 (fault-call:0 fault-nth:60): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:57 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs#', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:57 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x80) write$evdev(r0, &(0x7f0000000100), 0xff4e) 22:13:57 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x90) 22:13:57 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x06\x00'}) [ 206.599379][T11493] FAULT_INJECTION: forcing a failure. [ 206.599379][T11493] name failslab, interval 1, probability 0, space 0, times 0 [ 206.640798][T11493] CPU: 1 PID: 11493 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 206.648841][T11493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.648848][T11493] Call Trace: [ 206.648875][T11493] dump_stack+0x172/0x1f0 [ 206.648898][T11493] should_fail.cold+0xa/0x15 [ 206.648918][T11493] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 206.648940][T11493] ? ___might_sleep+0x163/0x280 [ 206.648962][T11493] __should_failslab+0x121/0x190 [ 206.648980][T11493] should_failslab+0x9/0x14 [ 206.648998][T11493] kmem_cache_alloc_trace+0x2d1/0x760 [ 206.649024][T11493] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 206.662412][T11493] __memcg_init_list_lru_node+0x8a/0x1e0 [ 206.662434][T11493] __list_lru_init+0x3cf/0x6e0 [ 206.662454][T11493] alloc_super+0x762/0x890 [ 206.662473][T11493] ? test_single_super+0x10/0x10 [ 206.722371][T11493] sget_userns+0xf1/0x560 [ 206.726719][T11493] ? kill_litter_super+0x60/0x60 [ 206.731766][T11493] ? test_single_super+0x10/0x10 [ 206.740064][T11493] ? kill_litter_super+0x60/0x60 [ 206.745039][T11493] sget+0x10c/0x150 [ 206.748860][T11493] mount_bdev+0xff/0x3c0 [ 206.753108][T11493] ? load_system_files+0x7620/0x7620 [ 206.758411][T11493] ntfs_mount+0x35/0x40 [ 206.762581][T11493] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 206.768134][T11493] legacy_get_tree+0xf2/0x200 [ 206.772823][T11493] vfs_get_tree+0x123/0x450 [ 206.777342][T11493] do_mount+0x1436/0x2c40 [ 206.781689][T11493] ? copy_mount_string+0x40/0x40 [ 206.786649][T11493] ? _copy_from_user+0xdd/0x150 [ 206.791518][T11493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 206.797767][T11493] ? copy_mount_options+0x280/0x3a0 [ 206.802973][T11493] ksys_mount+0xdb/0x150 [ 206.807246][T11493] __x64_sys_mount+0xbe/0x150 [ 206.811950][T11493] do_syscall_64+0x103/0x610 [ 206.816554][T11493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 206.822448][T11493] RIP: 0033:0x45ad6a [ 206.826348][T11493] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 206.846156][T11493] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 206.854612][T11493] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 206.862592][T11493] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 206.870577][T11493] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 206.878560][T11493] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 22:13:57 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 206.886538][T11493] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:57 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x20000303) 22:13:57 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\a\x00'}) 22:13:57 executing program 4 (fault-call:0 fault-nth:61): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:57 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs ', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:57 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1ff, 0x400002) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f0000000080)={0x7, 0x0, 'client0\x00', 0xffffffff80000003, "84e80a8117db2bc4", "a7ddbb996fd0f3742feea00294728a76b53f19d2021467a432534636303cfcd9", 0xffff, 0x8001}) 22:13:57 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 207.173606][T11519] FAULT_INJECTION: forcing a failure. [ 207.173606][T11519] name failslab, interval 1, probability 0, space 0, times 0 [ 207.205026][T11519] CPU: 1 PID: 11519 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 207.213072][T11519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.223322][T11519] Call Trace: [ 207.226632][T11519] dump_stack+0x172/0x1f0 [ 207.230981][T11519] should_fail.cold+0xa/0x15 [ 207.235593][T11519] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 207.241419][T11519] ? ___might_sleep+0x163/0x280 [ 207.246287][T11519] __should_failslab+0x121/0x190 [ 207.251247][T11519] should_failslab+0x9/0x14 [ 207.255761][T11519] kmem_cache_alloc_trace+0x2d1/0x760 [ 207.261142][T11519] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 207.266967][T11519] __memcg_init_list_lru_node+0x8a/0x1e0 [ 207.272618][T11519] __list_lru_init+0x3cf/0x6e0 [ 207.277425][T11519] alloc_super+0x762/0x890 [ 207.281849][T11519] ? test_single_super+0x10/0x10 [ 207.286790][T11519] sget_userns+0xf1/0x560 [ 207.291128][T11519] ? kill_litter_super+0x60/0x60 [ 207.296073][T11519] ? test_single_super+0x10/0x10 [ 207.301011][T11519] ? kill_litter_super+0x60/0x60 [ 207.306040][T11519] sget+0x10c/0x150 [ 207.309944][T11519] mount_bdev+0xff/0x3c0 [ 207.314227][T11519] ? load_system_files+0x7620/0x7620 [ 207.319524][T11519] ntfs_mount+0x35/0x40 [ 207.323687][T11519] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 207.329247][T11519] legacy_get_tree+0xf2/0x200 [ 207.333934][T11519] vfs_get_tree+0x123/0x450 [ 207.338444][T11519] do_mount+0x1436/0x2c40 [ 207.342783][T11519] ? copy_mount_string+0x40/0x40 [ 207.347741][T11519] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 207.353988][T11519] ? copy_mount_options+0x280/0x3a0 [ 207.359211][T11519] ksys_mount+0xdb/0x150 [ 207.363463][T11519] __x64_sys_mount+0xbe/0x150 [ 207.368147][T11519] do_syscall_64+0x103/0x610 [ 207.372749][T11519] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 207.378904][T11519] RIP: 0033:0x45ad6a [ 207.382801][T11519] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 207.402413][T11519] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 207.410840][T11519] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a 22:13:58 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00?\x00'}) [ 207.418823][T11519] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 207.426806][T11519] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 207.434788][T11519] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 207.442766][T11519] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:13:58 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:58 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00@\x00'}) 22:13:58 executing program 4 (fault-call:0 fault-nth:62): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:58 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:13:58 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x02\x00'}) [ 207.799481][T11552] FAULT_INJECTION: forcing a failure. [ 207.799481][T11552] name failslab, interval 1, probability 0, space 0, times 0 [ 207.838867][T11552] CPU: 0 PID: 11552 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 207.846926][T11552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.857512][T11552] Call Trace: [ 207.860839][T11552] dump_stack+0x172/0x1f0 [ 207.865224][T11552] should_fail.cold+0xa/0x15 [ 207.869837][T11552] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 207.875770][T11552] ? ___might_sleep+0x163/0x280 [ 207.880637][T11552] __should_failslab+0x121/0x190 [ 207.885673][T11552] should_failslab+0x9/0x14 [ 207.890185][T11552] kmem_cache_alloc_trace+0x2d1/0x760 [ 207.895592][T11552] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 207.901418][T11552] __memcg_init_list_lru_node+0x8a/0x1e0 [ 207.907070][T11552] __list_lru_init+0x3cf/0x6e0 [ 207.911846][T11552] alloc_super+0x762/0x890 [ 207.916281][T11552] ? test_single_super+0x10/0x10 [ 207.921239][T11552] sget_userns+0xf1/0x560 [ 207.925572][T11552] ? kill_litter_super+0x60/0x60 [ 207.930530][T11552] ? test_single_super+0x10/0x10 [ 207.935466][T11552] ? kill_litter_super+0x60/0x60 [ 207.940409][T11552] sget+0x10c/0x150 [ 207.944239][T11552] mount_bdev+0xff/0x3c0 [ 207.948482][T11552] ? load_system_files+0x7620/0x7620 [ 207.953773][T11552] ntfs_mount+0x35/0x40 [ 207.957933][T11552] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 207.963491][T11552] legacy_get_tree+0xf2/0x200 [ 207.968177][T11552] vfs_get_tree+0x123/0x450 [ 207.972702][T11552] do_mount+0x1436/0x2c40 [ 207.977044][T11552] ? copy_mount_string+0x40/0x40 [ 207.981998][T11552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 207.988252][T11552] ? copy_mount_options+0x280/0x3a0 [ 207.993464][T11552] ksys_mount+0xdb/0x150 [ 207.997804][T11552] __x64_sys_mount+0xbe/0x150 [ 208.002493][T11552] do_syscall_64+0x103/0x610 [ 208.007097][T11552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 208.012990][T11552] RIP: 0033:0x45ad6a [ 208.016889][T11552] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 208.036500][T11552] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 208.044935][T11552] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 208.052999][T11552] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 208.060973][T11552] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 208.068948][T11552] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 208.076922][T11552] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:00 executing program 1: syz_emit_ethernet(0x300cce, &(0x7f0000000080)={@local, @empty, [{}], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300008, 0x2f, 0x0, @ipv4={[0xb, 0x2, 0x543, 0x0, 0xe80, 0x0, 0xe80], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x3a, 0x0, 0x0, 0x0, [0x7, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x7, 0x8000) r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:00 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:00 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\x01'}) 22:14:00 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:00 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) 22:14:00 executing program 4 (fault-call:0 fault-nth:63): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 210.161685][T11562] __ntfs_error: 14 callbacks suppressed [ 210.161695][T11562] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 210.180123][T11570] FAULT_INJECTION: forcing a failure. [ 210.180123][T11570] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 210.181297][T11567] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 210.193486][T11570] CPU: 0 PID: 11570 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 210.193497][T11570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.193502][T11570] Call Trace: [ 210.193532][T11570] dump_stack+0x172/0x1f0 [ 210.193558][T11570] should_fail.cold+0xa/0x15 [ 210.193583][T11570] ? __list_lru_init+0x3cf/0x6e0 [ 210.237558][T11570] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 210.243396][T11570] ? __lock_acquire+0x548/0x3fb0 [ 210.248348][T11570] ? do_syscall_64+0x103/0x610 [ 210.253136][T11570] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.259230][T11570] ? __list_lru_init+0x4a6/0x6e0 [ 210.264187][T11570] should_fail_alloc_page+0x50/0x60 [ 210.269421][T11570] __alloc_pages_nodemask+0x1a1/0x7e0 [ 210.274813][T11570] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 210.280543][T11570] ? find_held_lock+0x35/0x130 [ 210.285328][T11570] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 210.291155][T11570] cache_grow_begin+0x9c/0x860 [ 210.295944][T11570] ? __memcg_init_list_lru_node+0x8a/0x1e0 [ 210.301765][T11570] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 210.308119][T11570] kmem_cache_alloc_trace+0x67f/0x760 [ 210.313520][T11570] __memcg_init_list_lru_node+0x8a/0x1e0 [ 210.319272][T11570] __list_lru_init+0x3cf/0x6e0 [ 210.324052][T11570] alloc_super+0x762/0x890 [ 210.328478][T11570] ? test_single_super+0x10/0x10 [ 210.333524][T11570] sget_userns+0xf1/0x560 [ 210.337863][T11570] ? kill_litter_super+0x60/0x60 [ 210.342827][T11570] ? test_single_super+0x10/0x10 [ 210.342847][T11570] ? kill_litter_super+0x60/0x60 [ 210.352739][T11570] sget+0x10c/0x150 [ 210.356563][T11570] mount_bdev+0xff/0x3c0 [ 210.360856][T11570] ? load_system_files+0x7620/0x7620 [ 210.366167][T11570] ntfs_mount+0x35/0x40 [ 210.370351][T11570] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 210.375944][T11570] legacy_get_tree+0xf2/0x200 [ 210.380661][T11570] vfs_get_tree+0x123/0x450 [ 210.385183][T11570] do_mount+0x1436/0x2c40 [ 210.389550][T11570] ? copy_mount_string+0x40/0x40 [ 210.394502][T11570] ? _copy_from_user+0xdd/0x150 [ 210.399371][T11570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.405634][T11570] ? copy_mount_options+0x280/0x3a0 [ 210.410854][T11570] ksys_mount+0xdb/0x150 [ 210.415105][T11570] __x64_sys_mount+0xbe/0x150 [ 210.419796][T11570] do_syscall_64+0x103/0x610 [ 210.424396][T11570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 210.430296][T11570] RIP: 0033:0x45ad6a [ 210.434205][T11570] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 210.453822][T11570] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 210.462260][T11570] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 210.470435][T11570] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 210.478420][T11570] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 210.486581][T11570] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 210.494569][T11570] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 210.504746][T11570] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:14:01 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\x02'}) 22:14:01 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:01 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x5}], 0x18) 22:14:01 executing program 4 (fault-call:0 fault-nth:64): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 210.639865][T11567] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:01 executing program 1: write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{}, 0x14}], 0x83) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0xfffffffffffffffe, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000080)={0x13, 0x3e, &(0x7f0000000040)="b3d2600a020ebf43052640c54d469b4de691338dbe73d05b4766bcb5771fcb080fec02246b891ba726b1e4f9787fc9a3cbb031c6c4fc3f679646551eab2c"}) 22:14:01 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x10', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:01 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\x03'}) [ 210.737003][T11587] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:01 executing program 1: r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000080)=""/183) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x1, 0x214802) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000040)) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x1000000010}], 0x18) [ 210.818678][T11592] FAULT_INJECTION: forcing a failure. [ 210.818678][T11592] name failslab, interval 1, probability 0, space 0, times 0 [ 210.839069][T11592] CPU: 0 PID: 11592 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 210.848691][T11592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.848698][T11592] Call Trace: [ 210.848730][T11592] dump_stack+0x172/0x1f0 [ 210.848754][T11592] should_fail.cold+0xa/0x15 [ 210.848783][T11592] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 210.877064][T11592] ? ___might_sleep+0x163/0x280 [ 210.881943][T11592] __should_failslab+0x121/0x190 [ 210.887343][T11592] should_failslab+0x9/0x14 [ 210.892706][T11592] kmem_cache_alloc_trace+0x2d1/0x760 [ 210.898118][T11592] __memcg_init_list_lru_node+0x8a/0x1e0 [ 210.903787][T11592] __list_lru_init+0x3cf/0x6e0 [ 210.908573][T11592] alloc_super+0x762/0x890 [ 210.913008][T11592] ? test_single_super+0x10/0x10 [ 210.917964][T11592] sget_userns+0xf1/0x560 [ 210.922315][T11592] ? kill_litter_super+0x60/0x60 [ 210.922330][T11592] ? test_single_super+0x10/0x10 [ 210.922341][T11592] ? kill_litter_super+0x60/0x60 [ 210.922352][T11592] sget+0x10c/0x150 [ 210.922379][T11592] mount_bdev+0xff/0x3c0 [ 210.922399][T11592] ? load_system_files+0x7620/0x7620 [ 210.922428][T11592] ntfs_mount+0x35/0x40 [ 210.922449][T11592] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 210.922470][T11592] legacy_get_tree+0xf2/0x200 [ 210.922486][T11592] vfs_get_tree+0x123/0x450 [ 210.922512][T11592] do_mount+0x1436/0x2c40 [ 210.922531][T11592] ? copy_mount_string+0x40/0x40 [ 210.979481][T11592] ? _copy_from_user+0xdd/0x150 [ 210.984443][T11592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 210.984459][T11592] ? copy_mount_options+0x280/0x3a0 [ 210.984477][T11592] ksys_mount+0xdb/0x150 [ 210.984494][T11592] __x64_sys_mount+0xbe/0x150 [ 210.984519][T11592] do_syscall_64+0x103/0x610 [ 211.010175][T11592] entry_SYSCALL_64_after_hwframe+0x49/0xbe 22:14:01 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\x04'}) [ 211.010190][T11592] RIP: 0033:0x45ad6a [ 211.010222][T11592] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 211.010229][T11592] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 211.010243][T11592] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 211.010251][T11592] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 211.010259][T11592] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 211.010267][T11592] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 211.010274][T11592] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x9d5, 0xfc) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:02 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x200040) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x60, 0x7, 0x3, "a02f9e7d5a2f4b8a74a496ff74ddc1b1", "c06dad277da22791c5707f41f0d287952714f2cdbe07af34e8727442fde57123a7e97f61a2328b0eca082f963532d633f2665a120e9eb72f6998fb93be440bf20fb528e4efd5042f88f6c7"}, 0x60, 0x3) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x303042, 0x0) getpeername$unix(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) 22:14:02 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:02 executing program 4 (fault-call:0 fault-nth:65): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:02 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\x05'}) 22:14:02 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r2, r3+30000000}, &(0x7f0000000200)) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x1, 0x200000) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000000c0)={0x9b, 0x5, 0x0, 0x3, 0xcbb, 0x100}) 22:14:02 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) mq_unlink(&(0x7f0000000100)='/dev/input/event#\x00') r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) accept$unix(r1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000300)={0x3f, {{0x2, 0x4e23, @broadcast}}, 0x1, 0x2, [{{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e24, @empty}}]}, 0x190) 22:14:02 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x0f', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 211.393144][T11622] QAT: Invalid ioctl [ 211.449951][T11626] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 211.459388][T11628] FAULT_INJECTION: forcing a failure. [ 211.459388][T11628] name failslab, interval 1, probability 0, space 0, times 0 [ 211.489073][T11628] CPU: 0 PID: 11628 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 22:14:02 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\x06'}) [ 211.497132][T11628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.497139][T11628] Call Trace: [ 211.497170][T11628] dump_stack+0x172/0x1f0 [ 211.497195][T11628] should_fail.cold+0xa/0x15 [ 211.510581][T11628] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 211.525303][T11628] ? ___might_sleep+0x163/0x280 [ 211.530180][T11628] __should_failslab+0x121/0x190 [ 211.535144][T11628] should_failslab+0x9/0x14 [ 211.539674][T11628] kmem_cache_alloc_trace+0x2d1/0x760 [ 211.545067][T11628] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 211.550907][T11628] __memcg_init_list_lru_node+0x8a/0x1e0 [ 211.556567][T11628] __list_lru_init+0x3cf/0x6e0 [ 211.561360][T11628] alloc_super+0x762/0x890 [ 211.565824][T11628] ? test_single_super+0x10/0x10 [ 211.570782][T11628] sget_userns+0xf1/0x560 [ 211.575131][T11628] ? kill_litter_super+0x60/0x60 [ 211.580085][T11628] ? test_single_super+0x10/0x10 [ 211.585039][T11628] ? kill_litter_super+0x60/0x60 [ 211.589996][T11628] sget+0x10c/0x150 [ 211.593846][T11628] mount_bdev+0xff/0x3c0 22:14:02 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl(r0, 0x2, &(0x7f0000000180)="61fe0a83e9edc76621d71e624cb02b4f6081f8ac42bfc29027fcfc88c4cb16b5240eed3a2ead003493a9ecf4bc6bbdd18927ae065033258d44d001ce806c383b1b4148ef9a852c44f4318da4f7bd62d1a52227b9e09ed8a3c13845ddfb7175ad43c95ea36e640499d2cff346d6ca2d97f2f336fbb68cf45c6d85a88445713752837a8c254b1b29674166be47b94174924cfd0d68fe50307654277babedf46cf5ee9671402ff119046877be1de2318b60ec883b4dbaec74e29069a8828dcc5694330d7d512fe201a8e9d97d4a0b886516dd404cc74c16e372508695eb0ef31f7d73d9d5") r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x40) write$P9_RSTATFS(r1, &(0x7f0000000040)={0x43, 0x9, 0x2, {0x4, 0x9, 0xed1, 0xda, 0xfffffffffffff801, 0x5, 0x1, 0x2, 0x9}}, 0x43) r2 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r2, &(0x7f0000000280)=[{{}, 0x14}], 0x83) [ 211.598101][T11628] ? load_system_files+0x7620/0x7620 [ 211.603407][T11628] ntfs_mount+0x35/0x40 [ 211.607680][T11628] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 211.613258][T11628] legacy_get_tree+0xf2/0x200 [ 211.617948][T11628] vfs_get_tree+0x123/0x450 [ 211.622485][T11628] do_mount+0x1436/0x2c40 [ 211.626839][T11628] ? copy_mount_string+0x40/0x40 [ 211.631801][T11628] ? _copy_from_user+0xdd/0x150 [ 211.636672][T11628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 211.642940][T11628] ? copy_mount_options+0x280/0x3a0 [ 211.648163][T11628] ksys_mount+0xdb/0x150 [ 211.652447][T11628] __x64_sys_mount+0xbe/0x150 [ 211.657138][T11628] do_syscall_64+0x103/0x610 [ 211.661745][T11628] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 211.667679][T11628] RIP: 0033:0x45ad6a [ 211.671586][T11628] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 211.691372][T11628] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:14:02 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\a'}) [ 211.699805][T11628] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 211.707791][T11628] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 211.715778][T11628] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 211.723759][T11628] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 211.731743][T11628] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:02 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:02 executing program 4 (fault-call:0 fault-nth:66): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:02 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:02 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00?'}) 22:14:02 executing program 1: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), 0x4) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) [ 211.996796][T11651] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 212.090209][T11657] FAULT_INJECTION: forcing a failure. [ 212.090209][T11657] name failslab, interval 1, probability 0, space 0, times 0 [ 212.090825][T11651] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 212.112217][T11658] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:03 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00@'}) [ 212.140462][T11657] CPU: 1 PID: 11657 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 212.148522][T11657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.148530][T11657] Call Trace: [ 212.148569][T11657] dump_stack+0x172/0x1f0 [ 212.166229][T11657] should_fail.cold+0xa/0x15 [ 212.170829][T11657] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 212.176654][T11657] ? ___might_sleep+0x163/0x280 [ 212.181508][T11657] __should_failslab+0x121/0x190 [ 212.186445][T11657] should_failslab+0x9/0x14 [ 212.190958][T11657] kmem_cache_alloc_trace+0x2d1/0x760 [ 212.196334][T11657] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 212.202138][T11657] __memcg_init_list_lru_node+0x8a/0x1e0 [ 212.207788][T11657] __list_lru_init+0x3cf/0x6e0 [ 212.212568][T11657] alloc_super+0x762/0x890 [ 212.216984][T11657] ? test_single_super+0x10/0x10 [ 212.221905][T11657] sget_userns+0xf1/0x560 [ 212.226224][T11657] ? kill_litter_super+0x60/0x60 [ 212.231149][T11657] ? test_single_super+0x10/0x10 [ 212.236084][T11657] ? kill_litter_super+0x60/0x60 [ 212.241007][T11657] sget+0x10c/0x150 [ 212.244822][T11657] mount_bdev+0xff/0x3c0 [ 212.249051][T11657] ? load_system_files+0x7620/0x7620 [ 212.254325][T11657] ntfs_mount+0x35/0x40 [ 212.258465][T11657] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 212.263998][T11657] legacy_get_tree+0xf2/0x200 [ 212.268665][T11657] vfs_get_tree+0x123/0x450 [ 212.273154][T11657] do_mount+0x1436/0x2c40 [ 212.277484][T11657] ? copy_mount_string+0x40/0x40 [ 212.282421][T11657] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 212.288653][T11657] ? copy_mount_options+0x280/0x3a0 [ 212.293839][T11657] ksys_mount+0xdb/0x150 [ 212.298085][T11657] __x64_sys_mount+0xbe/0x150 [ 212.302769][T11657] do_syscall_64+0x103/0x610 [ 212.307353][T11657] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 212.313246][T11657] RIP: 0033:0x45ad6a [ 212.317123][T11657] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 212.336739][T11657] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 212.345172][T11657] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 212.353242][T11657] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 212.361418][T11657] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 212.369400][T11657] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 212.377380][T11657] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:03 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x5, 0x2}], 0x18) 22:14:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x8, 0x400000) sync_file_range(r1, 0x3, 0x4, 0x2) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) write$evdev(r0, &(0x7f00000000c0)=[{{}, 0x14}], 0xffffffffffffff95) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x3f, 0x634e0c3f, 0x1008, 0x3, 0x3, 0x4, 0x3, 0x4}}) 22:14:03 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:03 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:03 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:03 executing program 4 (fault-call:0 fault-nth:67): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 212.630830][T11680] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:03 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:03 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x8) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000200)={r1, 0x3}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x4}, &(0x7f0000000100)=0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x4000, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000240), &(0x7f0000000300)=0x4) 22:14:03 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) clock_gettime(0x0, &(0x7f0000000000)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x840, 0x0) write$input_event(r1, &(0x7f0000000280)={{}, 0x3, 0x7fff, 0x4}, 0x18) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) socketpair(0x5, 0x4, 0x81, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000200)={&(0x7f0000000100)=@name={0x1e, 0x2, 0x3, {{0x2, 0x3}, 0x3}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000140)="33a030d89bef6073", 0x8}], 0x1, &(0x7f00000001c0)="f1ff4048dabd2f682c4db01cecdb880fd2ec24e9abfffb07dc1e7a1d04b0", 0x1e, 0x800}, 0x20040080) write$evdev(r0, &(0x7f0000000080)=[{{r2, r3/1000+10000}, 0x17, 0x340, 0x100000000000006}], 0xffffffffffffffe7) 22:14:03 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:03 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 212.821658][T11692] FAULT_INJECTION: forcing a failure. [ 212.821658][T11692] name failslab, interval 1, probability 0, space 0, times 0 [ 212.895422][T11692] CPU: 1 PID: 11692 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 212.903459][T11692] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.913530][T11692] Call Trace: [ 212.916854][T11692] dump_stack+0x172/0x1f0 [ 212.921217][T11692] should_fail.cold+0xa/0x15 [ 212.925828][T11692] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 212.931652][T11692] ? ___might_sleep+0x163/0x280 [ 212.936519][T11692] __should_failslab+0x121/0x190 [ 212.941465][T11692] should_failslab+0x9/0x14 [ 212.945975][T11692] kmem_cache_alloc_trace+0x2d1/0x760 [ 212.951357][T11692] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 212.957181][T11692] __memcg_init_list_lru_node+0x8a/0x1e0 [ 212.962834][T11692] __list_lru_init+0x3cf/0x6e0 [ 212.967988][T11692] alloc_super+0x762/0x890 [ 212.972413][T11692] ? test_single_super+0x10/0x10 [ 212.977357][T11692] sget_userns+0xf1/0x560 [ 212.981705][T11692] ? kill_litter_super+0x60/0x60 [ 212.986658][T11692] ? test_single_super+0x10/0x10 [ 212.991598][T11692] ? kill_litter_super+0x60/0x60 [ 212.996543][T11692] sget+0x10c/0x150 [ 213.000360][T11692] mount_bdev+0xff/0x3c0 [ 213.004610][T11692] ? load_system_files+0x7620/0x7620 [ 213.009904][T11692] ntfs_mount+0x35/0x40 [ 213.014064][T11692] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 213.019624][T11692] legacy_get_tree+0xf2/0x200 [ 213.024338][T11692] vfs_get_tree+0x123/0x450 [ 213.028854][T11692] do_mount+0x1436/0x2c40 [ 213.033194][T11692] ? copy_mount_string+0x40/0x40 [ 213.038158][T11692] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 213.044403][T11692] ? copy_mount_options+0x280/0x3a0 [ 213.049611][T11692] ksys_mount+0xdb/0x150 [ 213.053862][T11692] __x64_sys_mount+0xbe/0x150 [ 213.058550][T11692] do_syscall_64+0x103/0x610 [ 213.063154][T11692] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.069048][T11692] RIP: 0033:0x45ad6a [ 213.072944][T11692] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 213.092555][T11692] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 213.100980][T11692] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 213.108962][T11692] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 213.116945][T11692] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 213.124931][T11692] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 213.132923][T11692] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:04 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:04 executing program 1: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r2 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) write$evdev(r2, &(0x7f0000000140)=[{{r0, r1/1000+30000}, 0x100000018}], 0x18) setsockopt$nfc_llcp_NFC_LLCP_RW(r2, 0x118, 0x0, &(0x7f0000000080), 0x4) fsetxattr$security_evm(r2, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000100)=@v1={0x2, "37d368eb2cb171be074cd9ddf250b7"}, 0x10, 0x3) 22:14:04 executing program 4 (fault-call:0 fault-nth:68): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:04 executing program 2: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) ioctl$SIOCAX25NOUID(r0, 0x89e3, &(0x7f0000000000)=0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="fbf27b70bd597a724f"], &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r1, 0xf1}, 0x8) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000300)=""/230) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) 22:14:04 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:04 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:04 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) chdir(&(0x7f0000000000)='./file0\x00') write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:04 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 213.472578][T11726] FAULT_INJECTION: forcing a failure. [ 213.472578][T11726] name failslab, interval 1, probability 0, space 0, times 0 [ 213.492683][T11726] CPU: 0 PID: 11726 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 213.500687][T11726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.510741][T11726] Call Trace: [ 213.510769][T11726] dump_stack+0x172/0x1f0 [ 213.510792][T11726] should_fail.cold+0xa/0x15 [ 213.510813][T11726] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 213.510836][T11726] ? ___might_sleep+0x163/0x280 [ 213.510868][T11726] __should_failslab+0x121/0x190 [ 213.538596][T11726] should_failslab+0x9/0x14 [ 213.543110][T11726] kmem_cache_alloc_trace+0x2d1/0x760 [ 213.548489][T11726] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 213.554308][T11726] __memcg_init_list_lru_node+0x8a/0x1e0 [ 213.559947][T11726] __list_lru_init+0x3cf/0x6e0 [ 213.564718][T11726] alloc_super+0x762/0x890 [ 213.569139][T11726] ? test_single_super+0x10/0x10 [ 213.574082][T11726] sget_userns+0xf1/0x560 [ 213.578413][T11726] ? kill_litter_super+0x60/0x60 [ 213.583362][T11726] ? test_single_super+0x10/0x10 [ 213.588308][T11726] ? kill_litter_super+0x60/0x60 [ 213.593247][T11726] sget+0x10c/0x150 [ 213.597065][T11726] mount_bdev+0xff/0x3c0 [ 213.601339][T11726] ? load_system_files+0x7620/0x7620 [ 213.606638][T11726] ntfs_mount+0x35/0x40 [ 213.610798][T11726] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 213.616349][T11726] legacy_get_tree+0xf2/0x200 [ 213.621030][T11726] vfs_get_tree+0x123/0x450 [ 213.625544][T11726] do_mount+0x1436/0x2c40 [ 213.629883][T11726] ? copy_mount_string+0x40/0x40 [ 213.634826][T11726] ? _copy_from_user+0xdd/0x150 [ 213.639682][T11726] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 213.645923][T11726] ? copy_mount_options+0x280/0x3a0 [ 213.651124][T11726] ksys_mount+0xdb/0x150 [ 213.655407][T11726] __x64_sys_mount+0xbe/0x150 [ 213.660190][T11726] do_syscall_64+0x103/0x610 [ 213.664804][T11726] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 213.670698][T11726] RIP: 0033:0x45ad6a [ 213.674679][T11726] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 213.694294][T11726] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 213.702832][T11726] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 213.710832][T11726] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 213.718808][T11726] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 213.726834][T11726] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 213.734811][T11726] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000000)={[0xf000, 0x4000, 0x5000], 0xfff, 0x8, 0x10001}) 22:14:04 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:04 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:04 executing program 4 (fault-call:0 fault-nth:69): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:04 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x18) write(r0, &(0x7f0000000000)="cd69ef6533b0b9ebc50d9df398a932968bd6c5750bce2aa5b66f3335e058dd746543ab64669d4fe57fe2c08578b5fced9f3377bb04ec2fa4cb6c8a9d1449d57a9f98d04e7eb40f4b8ddc5d011e7e750378b772e91fa01206d26cd53b18d0353d1987c068d48a716b2812f9d15c831d3849d8b9fd51b04a9846b75fb6d0cea3b7311426083d229b25586eaadf87693f1290ba2dbca31b0437f6ef6ba59383d461efd9682036fd0388f04621d78b38118f4ca5fe255d0b2552cc321eb878c1ff9c774557622396d2f8680abab71f93adbd1c9b018a83e06e2ab464ac", 0xdb) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}, 0x14, 0xfffffffffffff95e, 0x80000000}, {{0x77359400}, 0x15, 0x7}, {{0x77359400}, 0x11, 0x1, 0x800}, {{}, 0x15, 0xffff, 0xfffffffffffffff7}, {{0x0, 0x7530}, 0x17, 0x10001, 0xa1af}, {{}, 0x12, 0x5, 0x28000000000}, {{r1, r2/1000+30000}, 0x15, 0x5, 0x5}, {{}, 0x4, 0x2, 0x9}], 0xc0) 22:14:04 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:04 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 214.070182][T11753] FAULT_INJECTION: forcing a failure. [ 214.070182][T11753] name failslab, interval 1, probability 0, space 0, times 0 [ 214.125983][T11753] CPU: 1 PID: 11753 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 214.134015][T11753] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.144074][T11753] Call Trace: [ 214.147386][T11753] dump_stack+0x172/0x1f0 [ 214.151738][T11753] should_fail.cold+0xa/0x15 [ 214.156342][T11753] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 214.162162][T11753] ? ___might_sleep+0x163/0x280 [ 214.167030][T11753] __should_failslab+0x121/0x190 [ 214.171971][T11753] should_failslab+0x9/0x14 [ 214.176483][T11753] kmem_cache_alloc_trace+0x2d1/0x760 [ 214.181868][T11753] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 214.187689][T11753] __memcg_init_list_lru_node+0x8a/0x1e0 [ 214.193341][T11753] __list_lru_init+0x3cf/0x6e0 [ 214.198118][T11753] alloc_super+0x78d/0x890 [ 214.202539][T11753] ? test_single_super+0x10/0x10 [ 214.207480][T11753] sget_userns+0xf1/0x560 [ 214.211815][T11753] ? kill_litter_super+0x60/0x60 [ 214.216758][T11753] ? test_single_super+0x10/0x10 [ 214.221698][T11753] ? kill_litter_super+0x60/0x60 [ 214.226648][T11753] sget+0x10c/0x150 [ 214.230471][T11753] mount_bdev+0xff/0x3c0 [ 214.234723][T11753] ? load_system_files+0x7620/0x7620 [ 214.240019][T11753] ntfs_mount+0x35/0x40 [ 214.244179][T11753] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 214.249749][T11753] legacy_get_tree+0xf2/0x200 [ 214.254440][T11753] vfs_get_tree+0x123/0x450 [ 214.258952][T11753] do_mount+0x1436/0x2c40 [ 214.263297][T11753] ? copy_mount_string+0x40/0x40 [ 214.268256][T11753] ? audit_add_tree_rule.cold+0x37/0x37 [ 214.273809][T11753] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 214.280060][T11753] ? copy_mount_options+0x280/0x3a0 [ 214.285270][T11753] ksys_mount+0xdb/0x150 [ 214.289547][T11753] __x64_sys_mount+0xbe/0x150 [ 214.294247][T11753] do_syscall_64+0x103/0x610 [ 214.298854][T11753] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.304751][T11753] RIP: 0033:0x45ad6a [ 214.308648][T11753] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 214.328260][T11753] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 214.336682][T11753] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 214.344693][T11753] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 214.352684][T11753] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 214.360669][T11753] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 214.368658][T11753] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x1, 0x80000) getsockname$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:05 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000080)=0x1e) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:05 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:05 executing program 4 (fault-call:0 fault-nth:70): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:05 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x13}], 0x18) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x40180, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000040)) 22:14:05 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x2, 0x3, 0x3, 0x1, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000000c0)={r2, 0x0, 0x4}, &(0x7f0000000100)=0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) [ 214.749880][T11792] QAT: Invalid ioctl [ 214.757181][T11784] FAULT_INJECTION: forcing a failure. [ 214.757181][T11784] name failslab, interval 1, probability 0, space 0, times 0 [ 214.779918][T11784] CPU: 0 PID: 11784 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 214.787952][T11784] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 214.798013][T11784] Call Trace: [ 214.798047][T11784] dump_stack+0x172/0x1f0 [ 214.798069][T11784] should_fail.cold+0xa/0x15 [ 214.798093][T11784] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 214.816083][T11784] ? ___might_sleep+0x163/0x280 [ 214.820945][T11784] __should_failslab+0x121/0x190 [ 214.825882][T11784] should_failslab+0x9/0x14 [ 214.830399][T11784] kmem_cache_alloc_trace+0x2d1/0x760 [ 214.835809][T11784] __memcg_init_list_lru_node+0x8a/0x1e0 [ 214.841473][T11784] __list_lru_init+0x3cf/0x6e0 [ 214.846252][T11784] alloc_super+0x762/0x890 [ 214.850675][T11784] ? test_single_super+0x10/0x10 [ 214.855626][T11784] sget_userns+0xf1/0x560 [ 214.859963][T11784] ? kill_litter_super+0x60/0x60 [ 214.864902][T11784] ? test_single_super+0x10/0x10 [ 214.869840][T11784] ? kill_litter_super+0x60/0x60 [ 214.874781][T11784] sget+0x10c/0x150 [ 214.878597][T11784] mount_bdev+0xff/0x3c0 [ 214.882838][T11784] ? load_system_files+0x7620/0x7620 [ 214.888127][T11784] ntfs_mount+0x35/0x40 [ 214.892769][T11784] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 214.898318][T11784] legacy_get_tree+0xf2/0x200 [ 214.903035][T11784] vfs_get_tree+0x123/0x450 [ 214.907545][T11784] do_mount+0x1436/0x2c40 [ 214.911897][T11784] ? copy_mount_string+0x40/0x40 [ 214.916845][T11784] ? __sanitizer_cov_trace_const_cmp4+0x20/0x20 [ 214.923123][T11784] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 214.929365][T11784] ? copy_mount_options+0x280/0x3a0 [ 214.934569][T11784] ksys_mount+0xdb/0x150 [ 214.938814][T11784] __x64_sys_mount+0xbe/0x150 [ 214.943501][T11784] do_syscall_64+0x103/0x610 [ 214.948104][T11784] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 214.953998][T11784] RIP: 0033:0x45ad6a [ 214.957896][T11784] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 214.977608][T11784] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 214.986023][T11784] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a 22:14:05 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:05 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 214.986033][T11784] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 214.986042][T11784] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 214.986050][T11784] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 214.986067][T11784] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 215.042499][T11792] QAT: Invalid ioctl 22:14:05 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) getitimer(0x3, &(0x7f0000000000)) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000400)={0x40000, 0xe08, 0x1ff, 0xd6, &(0x7f0000000080)=""/214, 0xff, &(0x7f0000000180)=""/255, 0xe8, &(0x7f0000000300)=""/232}) 22:14:06 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:06 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:06 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/prys/net/ipv4sh_period\x00', 0x2, 0x0) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x0) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) fchmod(r0, 0x6) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$VIDIOC_G_AUDOUT(r0, 0x80345631, &(0x7f00000000c0)) 22:14:06 executing program 4 (fault-call:0 fault-nth:71): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 215.215354][T11801] __ntfs_error: 16 callbacks suppressed [ 215.215364][T11801] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 215.278508][T11821] FAULT_INJECTION: forcing a failure. [ 215.278508][T11821] name failslab, interval 1, probability 0, space 0, times 0 [ 215.292022][T11821] CPU: 0 PID: 11821 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 215.300018][T11821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.310080][T11821] Call Trace: [ 215.313386][T11821] dump_stack+0x172/0x1f0 [ 215.317825][T11821] should_fail.cold+0xa/0x15 [ 215.322519][T11821] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 215.328341][T11821] ? ___might_sleep+0x163/0x280 [ 215.333217][T11821] __should_failslab+0x121/0x190 [ 215.338163][T11821] should_failslab+0x9/0x14 [ 215.342690][T11821] kmem_cache_alloc_trace+0x2d1/0x760 [ 215.348076][T11821] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 215.353902][T11821] __memcg_init_list_lru_node+0x8a/0x1e0 [ 215.359551][T11821] __list_lru_init+0x3cf/0x6e0 [ 215.364326][T11821] alloc_super+0x78d/0x890 [ 215.368748][T11821] ? test_single_super+0x10/0x10 [ 215.373693][T11821] sget_userns+0xf1/0x560 [ 215.378027][T11821] ? kill_litter_super+0x60/0x60 [ 215.382979][T11821] ? test_single_super+0x10/0x10 [ 215.387919][T11821] ? kill_litter_super+0x60/0x60 [ 215.392862][T11821] sget+0x10c/0x150 [ 215.396680][T11821] mount_bdev+0xff/0x3c0 [ 215.400941][T11821] ? load_system_files+0x7620/0x7620 [ 215.406274][T11821] ntfs_mount+0x35/0x40 [ 215.410436][T11821] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 215.415991][T11821] legacy_get_tree+0xf2/0x200 [ 215.420679][T11821] vfs_get_tree+0x123/0x450 [ 215.425187][T11821] do_mount+0x1436/0x2c40 [ 215.429545][T11821] ? copy_mount_string+0x40/0x40 [ 215.434493][T11821] ? copy_mount_options+0x198/0x3a0 [ 215.439693][T11821] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 215.445250][T11821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 215.451502][T11821] ? copy_mount_options+0x280/0x3a0 [ 215.456715][T11821] ksys_mount+0xdb/0x150 [ 215.460968][T11821] __x64_sys_mount+0xbe/0x150 [ 215.465660][T11821] do_syscall_64+0x103/0x610 [ 215.470266][T11821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 215.476160][T11821] RIP: 0033:0x45ad6a [ 215.480066][T11821] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 215.499691][T11821] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 215.508115][T11821] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 215.516093][T11821] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 215.524076][T11821] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 215.532054][T11821] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 215.540030][T11821] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:06 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:06 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:06 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1000, 0x3) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000080)={{0x71, 0x10001}, 'port0\x00', 0x10, 0x40000, 0x1, 0x40c, 0x4, 0xffffffffffffff54, 0x3ff, 0x0, 0x5, 0x1}) r1 = getpgid(0x0) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000240)=r1) r2 = gettid() rt_sigtimedwait(&(0x7f0000000000)={0xfffffffffffff6b1}, 0x0, 0x0, 0x8) rt_sigqueueinfo(r2, 0x15, &(0x7f0000000100)={0x0, 0x0, 0xfffffffffffffff6}) r3 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0xfffffffffffffffe, 0x28001) write$evdev(r3, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$sock_x25_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@null=' \x00', 0xe, 'vlan0\x00'}) 22:14:06 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) ioctl$VIDIOC_G_STD(0xffffffffffffff9c, 0x80085617, &(0x7f0000000040)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000080)=r2) 22:14:06 executing program 4 (fault-call:0 fault-nth:72): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 215.743145][T11831] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:06 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x1, 0x28001) write$P9_RCREATE(r0, &(0x7f0000000040)={0x18, 0x73, 0x2, {{0x0, 0x2, 0x1}, 0x101}}, 0x18) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:06 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 215.852158][T11831] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:06 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x02\x00'}) 22:14:06 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 215.945475][T11846] FAULT_INJECTION: forcing a failure. [ 215.945475][T11846] name failslab, interval 1, probability 0, space 0, times 0 [ 215.976454][T11846] CPU: 1 PID: 11846 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 215.984497][T11846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 215.994674][T11846] Call Trace: [ 215.997998][T11846] dump_stack+0x172/0x1f0 [ 216.002356][T11846] should_fail.cold+0xa/0x15 [ 216.006975][T11846] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 216.012892][T11846] ? ___might_sleep+0x163/0x280 [ 216.017849][T11846] __should_failslab+0x121/0x190 [ 216.022802][T11846] should_failslab+0x9/0x14 [ 216.027326][T11846] kmem_cache_alloc_node_trace+0x270/0x720 [ 216.033167][T11846] __kmalloc_node+0x3d/0x70 [ 216.038310][T11846] kvmalloc_node+0x68/0x100 [ 216.042834][T11846] __list_lru_init+0x4a6/0x6e0 [ 216.047617][T11846] alloc_super+0x78d/0x890 [ 216.052050][T11846] ? test_single_super+0x10/0x10 [ 216.057003][T11846] sget_userns+0xf1/0x560 [ 216.061344][T11846] ? kill_litter_super+0x60/0x60 [ 216.066302][T11846] ? test_single_super+0x10/0x10 [ 216.071245][T11846] ? kill_litter_super+0x60/0x60 [ 216.076193][T11846] sget+0x10c/0x150 [ 216.080030][T11846] mount_bdev+0xff/0x3c0 [ 216.084279][T11846] ? load_system_files+0x7620/0x7620 [ 216.089577][T11846] ntfs_mount+0x35/0x40 [ 216.093762][T11846] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 216.099319][T11846] legacy_get_tree+0xf2/0x200 [ 216.104014][T11846] vfs_get_tree+0x123/0x450 [ 216.108521][T11846] do_mount+0x1436/0x2c40 [ 216.112864][T11846] ? copy_mount_string+0x40/0x40 [ 216.117815][T11846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.124068][T11846] ? copy_mount_options+0x280/0x3a0 [ 216.129276][T11846] ksys_mount+0xdb/0x150 [ 216.133530][T11846] __x64_sys_mount+0xbe/0x150 [ 216.138227][T11846] do_syscall_64+0x103/0x610 [ 216.142837][T11846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.148819][T11846] RIP: 0033:0x45ad6a [ 216.152726][T11846] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 216.172340][T11846] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 216.180854][T11846] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 216.188840][T11846] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 22:14:07 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000040)={{0x10001, 0x2, 0x8, 0x2fe89d6d, 0x7fffffff, 0x100000001}, 0x3, 0x2, 0x1}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) [ 216.196831][T11846] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 216.204930][T11846] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 216.212910][T11846] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:07 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x03\x00'}) 22:14:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x222, 0x4001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) [ 216.340018][T11863] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:07 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) pselect6(0x40, &(0x7f0000000000)={0x74, 0x2, 0xe9ff, 0xffff, 0x1, 0x6e, 0x8, 0x1800000000000}, &(0x7f0000000040)={0xde, 0x3, 0x8, 0x4, 0x9, 0x4, 0x3f, 0x40008000000}, &(0x7f0000000080)={0x7, 0x0, 0x8, 0x10000, 0xff, 0x3, 0x8000, 0x3e}, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={0x9}, 0x8}) 22:14:07 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x04\x00'}) 22:14:07 executing program 4 (fault-call:0 fault-nth:73): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:07 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:ppp_device_t:s0\x00', 0x22, 0x0) [ 216.533765][T11863] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 216.546264][T11881] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:07 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xc0', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 216.627412][T11887] FAULT_INJECTION: forcing a failure. [ 216.627412][T11887] name failslab, interval 1, probability 0, space 0, times 0 [ 216.641845][T11881] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 216.669394][T11887] CPU: 0 PID: 11887 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 216.677421][T11887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 216.677428][T11887] Call Trace: [ 216.677456][T11887] dump_stack+0x172/0x1f0 [ 216.677480][T11887] should_fail.cold+0xa/0x15 [ 216.677503][T11887] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 216.690860][T11887] ? ___might_sleep+0x163/0x280 [ 216.690880][T11887] __should_failslab+0x121/0x190 [ 216.690896][T11887] should_failslab+0x9/0x14 [ 216.690912][T11887] kmem_cache_alloc_trace+0x2d1/0x760 [ 216.690931][T11887] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 216.690953][T11887] __memcg_init_list_lru_node+0x8a/0x1e0 [ 216.690972][T11887] __list_lru_init+0x3cf/0x6e0 [ 216.748440][T11887] alloc_super+0x78d/0x890 [ 216.752902][T11887] ? test_single_super+0x10/0x10 [ 216.758265][T11887] sget_userns+0xf1/0x560 [ 216.762604][T11887] ? kill_litter_super+0x60/0x60 [ 216.767550][T11887] ? test_single_super+0x10/0x10 [ 216.772496][T11887] ? kill_litter_super+0x60/0x60 [ 216.777439][T11887] sget+0x10c/0x150 [ 216.781258][T11887] mount_bdev+0xff/0x3c0 [ 216.785501][T11887] ? load_system_files+0x7620/0x7620 [ 216.790795][T11887] ntfs_mount+0x35/0x40 [ 216.794954][T11887] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 216.800511][T11887] legacy_get_tree+0xf2/0x200 [ 216.805213][T11887] vfs_get_tree+0x123/0x450 [ 216.809730][T11887] do_mount+0x1436/0x2c40 [ 216.814071][T11887] ? copy_mount_string+0x40/0x40 [ 216.819015][T11887] ? _copy_from_user+0xdd/0x150 [ 216.823877][T11887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 216.830125][T11887] ? copy_mount_options+0x280/0x3a0 [ 216.835337][T11887] ksys_mount+0xdb/0x150 [ 216.839705][T11887] __x64_sys_mount+0xbe/0x150 [ 216.844399][T11887] do_syscall_64+0x103/0x610 [ 216.849004][T11887] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 216.854899][T11887] RIP: 0033:0x45ad6a [ 216.858799][T11887] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 216.878433][T11887] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 216.886856][T11887] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 216.895331][T11887] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 216.903309][T11887] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 216.911319][T11887] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 22:14:07 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x05\x00'}) 22:14:07 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = dup(r0) getsockname$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000040)=0x1c) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) [ 216.919303][T11887] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:07 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:07 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x06\x00'}) 22:14:07 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="18262543c82bcd15d05f9c7c0ffb49b32a594ed1253529b3aae9f636334941f92c3d15ee767282d4d2863988d05e49033a02f6b1ba1992cf6ca1c95efc58ec7617c5bd4801592d845f7f8df2578bbe9beb26d6b3ca1e008afbc3b5c2bf2e98fa83dc99243977bfdb5f692a829bdf05e11c5c42d02147d879871fb7083a9f4b76e9a9cb80823e99e2df11825ffd0a3d8a235bc88ed9e2204ec48a871af55e7ba031ee193e75e66378475e87e31bc97df6481d7d15e000dffc3c6c3624bb385f9b9c1688657aaf3af865102ef619eca1d09258afbc417903c334fdd2b77e5a601d6895fe95e7e64b6b6ab61f67caa89b71bff94912e751dbba", 0xf8, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, r1, r2) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r3, 0x408c563e, &(0x7f0000000300)={0x2, 0xe, 0x2e, "3d3bbdf4983dfeeb63c754b8b6f6fb57d47ad346551822cc8b50a5a611bd7a9f3f9b8af4508d10d42cbf283b8dbb2d8d687a51320d48d75ef1b28869", 0x2a, "7f66ff5a33f1f5defcbad844b86ba189e7ca5fab19715ad37bda570a4e6c0449c92cea81749ef5b7f79f7e50514d29d5c9a69aadb8eb68ceb0940e29", 0x20}) 22:14:08 executing program 4 (fault-call:0 fault-nth:74): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:08 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\a\x00'}) 22:14:08 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x3, 0x10104) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x80, 0x80101) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000040)=@req3={0x4, 0x4, 0x3def, 0x6, 0x0, 0x7, 0x100000000}, 0x1c) write$evdev(r0, &(0x7f0000000280), 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) 22:14:08 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 217.271997][T11918] FAULT_INJECTION: forcing a failure. [ 217.271997][T11918] name failslab, interval 1, probability 0, space 0, times 0 [ 217.342076][T11918] CPU: 0 PID: 11918 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 217.350098][T11918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.350105][T11918] Call Trace: [ 217.350132][T11918] dump_stack+0x172/0x1f0 [ 217.350155][T11918] should_fail.cold+0xa/0x15 [ 217.350179][T11918] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 217.378208][T11918] ? ___might_sleep+0x163/0x280 [ 217.383079][T11918] __should_failslab+0x121/0x190 [ 217.388020][T11918] should_failslab+0x9/0x14 [ 217.392527][T11918] kmem_cache_alloc_trace+0x2d1/0x760 [ 217.397908][T11918] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 217.403909][T11918] __memcg_init_list_lru_node+0x8a/0x1e0 [ 217.409554][T11918] __list_lru_init+0x3cf/0x6e0 [ 217.414327][T11918] alloc_super+0x78d/0x890 [ 217.414344][T11918] ? test_single_super+0x10/0x10 [ 217.414360][T11918] sget_userns+0xf1/0x560 [ 217.414378][T11918] ? kill_litter_super+0x60/0x60 [ 217.432985][T11918] ? test_single_super+0x10/0x10 [ 217.437927][T11918] ? kill_litter_super+0x60/0x60 [ 217.442872][T11918] sget+0x10c/0x150 [ 217.446691][T11918] mount_bdev+0xff/0x3c0 [ 217.450934][T11918] ? load_system_files+0x7620/0x7620 [ 217.456241][T11918] ntfs_mount+0x35/0x40 [ 217.460412][T11918] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 217.465973][T11918] legacy_get_tree+0xf2/0x200 [ 217.470662][T11918] vfs_get_tree+0x123/0x450 [ 217.475171][T11918] do_mount+0x1436/0x2c40 [ 217.479524][T11918] ? copy_mount_string+0x40/0x40 [ 217.484463][T11918] ? copy_mount_options+0x1ea/0x3a0 22:14:08 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x03\x00'}) [ 217.489663][T11918] ? copy_mount_options+0x1f0/0x3a0 [ 217.494864][T11918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 217.501106][T11918] ? copy_mount_options+0x280/0x3a0 [ 217.506319][T11918] ksys_mount+0xdb/0x150 [ 217.510566][T11918] __x64_sys_mount+0xbe/0x150 [ 217.515256][T11918] do_syscall_64+0x103/0x610 [ 217.519855][T11918] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 217.525753][T11918] RIP: 0033:0x45ad6a [ 217.529653][T11918] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 217.549273][T11918] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 217.557693][T11918] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 217.565670][T11918] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 217.573646][T11918] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 217.581619][T11918] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 22:14:08 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x2000, 0x0) ioctl$int_in(r0, 0x5473, &(0x7f0000000040)=0xf7) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:08 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x4000ea, 0x1ffffe) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) [ 217.589591][T11918] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 217.636177][T11928] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:08 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000000, 0x28001) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, 0x7, 0x5, 0x51, &(0x7f0000ffc000/0x3000)=nil, 0x5017}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:14:08 executing program 4 (fault-call:0 fault-nth:75): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:08 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:08 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x05\x00'}) [ 217.762801][T11928] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={0x0, 0x88, "c142fd99130942c1868bed9978a47afff6a8be46744a73b5d8cbecad24ddef5720ca194551c3890b1825979173d1ced1c6c231de2fbfafc1a8166d8191030e3df1e60f7233049bc96a746da9080cdd3a8ca3ca0a2a396c6ef4282c2d537ea7bae848bdcd360142cb0cb05b53ed0a20d075735295dc8d53c2912dfc1c047f0ba732acb5a75024b0ae"}, &(0x7f0000000100)=0x90) ioctl$KVM_X86_SET_MCE(r1, 0x4040ae9e, &(0x7f0000000180)={0x1200000000000000, 0x2000, 0x0, 0xa, 0xc}) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0xa5, 0x30}, 0xc) 22:14:08 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 217.809978][T11944] FAULT_INJECTION: forcing a failure. [ 217.809978][T11944] name failslab, interval 1, probability 0, space 0, times 0 [ 217.847401][T11944] CPU: 0 PID: 11944 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 217.855429][T11944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 217.865488][T11944] Call Trace: [ 217.868798][T11944] dump_stack+0x172/0x1f0 [ 217.873143][T11944] should_fail.cold+0xa/0x15 [ 217.877739][T11944] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 217.883553][T11944] ? ___might_sleep+0x163/0x280 [ 217.888409][T11944] __should_failslab+0x121/0x190 [ 217.893352][T11944] should_failslab+0x9/0x14 [ 217.897859][T11944] kmem_cache_alloc_trace+0x2d1/0x760 [ 217.903252][T11944] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 217.909069][T11944] __memcg_init_list_lru_node+0x8a/0x1e0 [ 217.914796][T11944] __list_lru_init+0x3cf/0x6e0 [ 217.919572][T11944] alloc_super+0x78d/0x890 [ 217.923998][T11944] ? test_single_super+0x10/0x10 [ 217.928942][T11944] sget_userns+0xf1/0x560 [ 217.933275][T11944] ? kill_litter_super+0x60/0x60 [ 217.938230][T11944] ? test_single_super+0x10/0x10 [ 217.943169][T11944] ? kill_litter_super+0x60/0x60 [ 217.948125][T11944] sget+0x10c/0x150 [ 217.951944][T11944] mount_bdev+0xff/0x3c0 [ 217.956189][T11944] ? load_system_files+0x7620/0x7620 [ 217.961499][T11944] ntfs_mount+0x35/0x40 [ 217.965688][T11944] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 217.971356][T11944] legacy_get_tree+0xf2/0x200 [ 217.976055][T11944] vfs_get_tree+0x123/0x450 [ 217.980584][T11944] do_mount+0x1436/0x2c40 [ 217.984938][T11944] ? copy_mount_string+0x40/0x40 [ 217.990160][T11944] ? _copy_from_user+0xdd/0x150 [ 217.995042][T11944] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 218.001302][T11944] ? copy_mount_options+0x280/0x3a0 [ 218.006787][T11944] ksys_mount+0xdb/0x150 [ 218.011073][T11944] __x64_sys_mount+0xbe/0x150 [ 218.015767][T11944] do_syscall_64+0x103/0x610 [ 218.020371][T11944] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.026268][T11944] RIP: 0033:0x45ad6a [ 218.030178][T11944] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 218.049801][T11944] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 22:14:08 executing program 1: r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000000), 0x80800) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000000040)={0x81, @dev={[], 0x27}}) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280), 0x0) sendmmsg$unix(r0, &(0x7f0000000880)=[{&(0x7f0000000080)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000100)="bb5374a03a05e84ca19a3e160205cf233f0567b9185a9edd1ecc195a1039ff96a70b4ace09c48fc28f92aa666655c7a0a10f7a8162b064cc2249cff028390f7f9ae17216386f2e5fa3e9ef303a31f60827e84222792d2bb3eba72f7c43075bc2104d5bc06ad51977454b4ece74fdac3c2e04d91467370cfac5da9f181f4c58c92a1b1df90a01793d6bdf1a68779e8a46be04b47a0cf2c5e34db31a870488d11f39bba76208ab80d13a31ed4048a6a0f4ad487be7c5036123b539f9f97a7f414322e5ecce9e5e03a5fbb5afda91fc5acd34a6133c332a", 0xd6}, {&(0x7f0000000200)="8a277da4c7e7196d2cfd4990582e53b28cf286029d6dcbaa0d2dba4cf0a988edf2a05c6c1b4a65c55a2f120d1db5e260fe5d3074c18fbbb194a96164bec4c33c9fb242b8d8ac414f2b3a7a6a01a306d411d5f3cbba2f13039561311737e94d2bc3c0f8fc", 0x64}, {&(0x7f0000000300)="3df5bc293142cd5fdd18266e497ee1c6b8aef4906cafcc7904d82534eee46e4b62bbd98b41f04afcdb42098285ebbd228d69e328a550b046f380ea43571d3898121853f38aa3a27fd1ec85001c9b66b1a35b70f1b8ce937fa9a7f2bd674c6e10ca476122782f5051d50fe7e8705c1f0be07a15dc19aaa09a1ef3a643b6d56e97fc5b5315999cc32eaa4465033df3ac71e093f50537c6d186ec563cfb651e7966f3bac3406b689919268a6a9d54705af842544cd20cc432dbac5b648f9e17cfa0ce33c205e4dcf7cc048c1c6c1b532e989d5fba", 0xd3}, {&(0x7f0000000400)="aafddac799382e1f54eece59688e40195ec7514b641a94bbf16292d283a0a2b0a8940e32ff184101e8939cdc2678c001f56fefe96da0e06fbf1fb3c1bc707a8f4c610c87fb01e144559c1a2d4f2e9655fb6e1442ee2739be08ad50c975f1e5dfce69c8f49d19bc8581652ed737eded35133fd99de750981ebedaa78c99b5a4ef6fc4c8a1dcad392b1b01931672a861e62d366899d82cef5e5596f80c6ada50a3e23bf9048b2bf0cb1f30593b3b7fb13221e5e66cc21b4062119d9cd670ba4ca69688", 0xc2}, {&(0x7f0000000500)="844f95bdd78dfd8c0006b0033c6507beb399ef65376aa734d033314ce6cd41116f26269094b3e9b7557d8c956c0d999cad363e0c7ce84a1a870846ffac05fe8697ec5d97517e8a2d58103168a5b28aa22a3489ec8895e2969bb85920", 0x5c}], 0x5, 0x0, 0x0, 0x4010}, {&(0x7f0000000600)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000680)="afcc92a1c99673696a89e3629046d9bb2bd58579e2d4c98d2f72ac5f69b76fc271000631c48eb3ed5a19380ec785a700e5ff57d98b44e0f289e6a27a9ee869d4eb9885fa90084e25d6823e039995e4fe98f2fbcf64b5caf8724e4dddee10262c1bf1d3af88a6de582e60320f8ecdc6115da9b751d297abcb9a9fbe7e02871116aeeeac993c64e1d061781465d0b0193979fb23b5f0c9fb5eef2568748d4a781fb6476132fdef44ce9a30ade458c5260007002f7eccca", 0xb6}, {&(0x7f0000000740)="8221f6b42982cc4631700fc8c6d0001e27b35fb4dd5282a5d609d83c5fb424cb74aaf06b02c38a98ce77e4738f651ee2b754fbef850749adefe043592301045272464cbc151e793d7416b3dc6128d72bacb0b684915719854f9bc663ce7b4f60378e707efc622deac472e43395028c372c4c73f9a1e68f165fcf609952cfcd4b226a83", 0x83}], 0x2, &(0x7f0000000800)=[@rights={0x20, 0x1, 0x1, [r0, r1, r0]}, @rights={0x28, 0x1, 0x1, [r1, r1, r0, r1, r1]}], 0x48, 0x840}], 0x2, 0x40040) [ 218.058258][T11944] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 218.066249][T11944] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 218.074322][T11944] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 218.082309][T11944] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 218.090294][T11944] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:09 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x06\x00'}) [ 218.200086][T11957] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:09 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\a\x00'}) 22:14:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x10f74e, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:09 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x1ede5) r2 = accept(r0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/240, 0xf0, 0x2001, &(0x7f0000000140)={0xa, 0x4e24, 0x100000001, @mcast2, 0x3ff}, 0x1c) shutdown(r2, 0x2) close(r2) r3 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0xec, r4, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nlmon0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80000000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1f}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe666}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9e4d}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xc07}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff60}]}, 0xec}, 0x1, 0x0, 0x0, 0x40044}, 0x80) write$evdev(r3, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = dup2(r0, r0) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000080)=""/226) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) r2 = fcntl$dupfd(r0, 0x2, r1) r3 = open(&(0x7f0000000000)='./file0\x00', 0x8a001, 0x40) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000180), 0x4) ioctl$TUNSETPERSIST(r3, 0x400454cb, 0x1) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000040)={r2, 0x3, 0x8, r3}) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f00000001c0), 0x4) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:09 executing program 4 (fault-call:0 fault-nth:76): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:09 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:09 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:09 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00?\x00'}) 22:14:09 executing program 1: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000040)={0x6, 0x8000, 0x5, {0x0, 0x1c9c380}, 0x101, 0x4}) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x28, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={r2, 0x41, 0x8}, 0xc) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f00000001c0)={0x0, 0x1, 0x7, &(0x7f0000000180)=0x7fff}) arch_prctl$ARCH_SET_GS(0x1001, 0xe08) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) [ 218.522524][T11997] FAULT_INJECTION: forcing a failure. [ 218.522524][T11997] name failslab, interval 1, probability 0, space 0, times 0 [ 218.558925][T11997] CPU: 1 PID: 11997 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 218.566959][T11997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 218.577023][T11997] Call Trace: [ 218.580327][T11997] dump_stack+0x172/0x1f0 [ 218.584673][T11997] should_fail.cold+0xa/0x15 [ 218.589276][T11997] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 218.595091][T11997] ? ___might_sleep+0x163/0x280 [ 218.599945][T11997] __should_failslab+0x121/0x190 [ 218.604887][T11997] should_failslab+0x9/0x14 [ 218.609391][T11997] kmem_cache_alloc_trace+0x2d1/0x760 [ 218.614772][T11997] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 218.620587][T11997] __memcg_init_list_lru_node+0x8a/0x1e0 [ 218.626241][T11997] __list_lru_init+0x3cf/0x6e0 [ 218.631067][T11997] alloc_super+0x78d/0x890 [ 218.635488][T11997] ? test_single_super+0x10/0x10 [ 218.640432][T11997] sget_userns+0xf1/0x560 [ 218.644763][T11997] ? kill_litter_super+0x60/0x60 [ 218.649703][T11997] ? test_single_super+0x10/0x10 [ 218.654644][T11997] ? kill_litter_super+0x60/0x60 [ 218.659666][T11997] sget+0x10c/0x150 [ 218.663480][T11997] mount_bdev+0xff/0x3c0 [ 218.667728][T11997] ? load_system_files+0x7620/0x7620 [ 218.673018][T11997] ntfs_mount+0x35/0x40 [ 218.677183][T11997] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 218.682742][T11997] legacy_get_tree+0xf2/0x200 [ 218.687428][T11997] vfs_get_tree+0x123/0x450 [ 218.691935][T11997] do_mount+0x1436/0x2c40 [ 218.696274][T11997] ? copy_mount_string+0x40/0x40 [ 218.701245][T11997] ? copy_mount_options+0x198/0x3a0 [ 218.707258][T11997] ? copy_mount_options+0x19c/0x3a0 [ 218.713135][T11997] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 218.719383][T11997] ? copy_mount_options+0x280/0x3a0 [ 218.724622][T11997] ksys_mount+0xdb/0x150 [ 218.728875][T11997] __x64_sys_mount+0xbe/0x150 [ 218.733560][T11997] do_syscall_64+0x103/0x610 [ 218.738161][T11997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 218.744062][T11997] RIP: 0033:0x45ad6a [ 218.747962][T11997] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 218.767568][T11997] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 218.775990][T11997] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 218.783971][T11997] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 218.791949][T11997] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 218.799928][T11997] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 218.807906][T11997] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:09 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00@\x00'}) 22:14:09 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:09 executing program 4 (fault-call:0 fault-nth:77): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:09 executing program 1: gettid() r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) r2 = fcntl$getown(r0, 0x9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x10, 0x0, [0x81, 0x2000000000000000, 0xfb, 0x3, 0x1, 0x5, 0x20, 0x7, 0x4, 0xfffffffffffffffa, 0x10000, 0x10, 0xffff, 0x4, 0x5, 0x67]}, {0xf, 0x0, [0x10000, 0x9, 0x10000, 0x9, 0x1f, 0xfffffffffffff001, 0x9, 0x199, 0x5, 0x0, 0x2bef, 0x0, 0x1, 0x2, 0x2, 0x80]}, {0x4, 0x0, [0x6, 0x9, 0x3, 0x81, 0x1, 0x8000, 0x4, 0x5624, 0xfffffffeffffffff, 0x8, 0x2, 0x7, 0x7, 0x800, 0x2, 0x5]}, {0x20, 0x0, [0x5, 0x8, 0x53, 0x5, 0x6, 0x2, 0x1ff, 0x2f, 0x100, 0xffffffff, 0x2, 0x7f, 0x3, 0x20, 0x100]}, {0x28, 0x0, [0x5, 0xb3, 0xffffffffffffcc27, 0x8, 0x480000000000, 0x9, 0x18000000, 0xfff, 0x5, 0x8, 0xffffffffb2bd0680, 0xdc, 0x7f, 0x81, 0x68c2, 0xffff]}, {0x14, 0x0, [0x7, 0x7, 0x400, 0x5, 0x4, 0x0, 0x5, 0xff, 0x1, 0x5, 0x5, 0x2, 0x1400000000, 0x5, 0x4, 0x7]}], r1, 0x1, 0x1, 0x1b0}}, 0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x800, 0x0) r4 = semget(0x0, 0x1, 0x203) clock_gettime(0x7, &(0x7f00000004c0)) semtimedop(r4, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000340), &(0x7f0000000380)=0x4) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0xffffffff, &(0x7f00000003c0)=""/63) write$binfmt_aout(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/1641], 0x669) 22:14:09 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 219.090888][T12023] FAULT_INJECTION: forcing a failure. [ 219.090888][T12023] name failslab, interval 1, probability 0, space 0, times 0 [ 219.113648][T12023] CPU: 0 PID: 12023 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 219.121670][T12023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.131762][T12023] Call Trace: [ 219.135071][T12023] dump_stack+0x172/0x1f0 [ 219.139417][T12023] should_fail.cold+0xa/0x15 [ 219.144021][T12023] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 219.149837][T12023] ? ___might_sleep+0x163/0x280 [ 219.154699][T12023] __should_failslab+0x121/0x190 [ 219.159644][T12023] should_failslab+0x9/0x14 [ 219.164158][T12023] kmem_cache_alloc_trace+0x2d1/0x760 [ 219.169538][T12023] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 219.175359][T12023] __memcg_init_list_lru_node+0x8a/0x1e0 [ 219.181003][T12023] __list_lru_init+0x3cf/0x6e0 [ 219.185787][T12023] alloc_super+0x78d/0x890 [ 219.190225][T12023] ? test_single_super+0x10/0x10 [ 219.195169][T12023] sget_userns+0xf1/0x560 [ 219.199517][T12023] ? kill_litter_super+0x60/0x60 [ 219.204465][T12023] ? test_single_super+0x10/0x10 [ 219.209410][T12023] ? kill_litter_super+0x60/0x60 [ 219.214356][T12023] sget+0x10c/0x150 [ 219.218175][T12023] mount_bdev+0xff/0x3c0 [ 219.222440][T12023] ? load_system_files+0x7620/0x7620 [ 219.227736][T12023] ntfs_mount+0x35/0x40 [ 219.232164][T12023] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 219.237731][T12023] legacy_get_tree+0xf2/0x200 [ 219.242417][T12023] vfs_get_tree+0x123/0x450 [ 219.246969][T12023] do_mount+0x1436/0x2c40 [ 219.251552][T12023] ? copy_mount_string+0x40/0x40 [ 219.256539][T12023] ? _copy_from_user+0xdd/0x150 [ 219.261426][T12023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 219.267678][T12023] ? copy_mount_options+0x280/0x3a0 [ 219.273008][T12023] ksys_mount+0xdb/0x150 [ 219.277296][T12023] __x64_sys_mount+0xbe/0x150 [ 219.282014][T12023] do_syscall_64+0x103/0x610 [ 219.286747][T12023] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.293091][T12023] RIP: 0033:0x45ad6a [ 219.296996][T12023] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 219.316609][T12023] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 219.325030][T12023] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 219.333005][T12023] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 219.340985][T12023] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 219.348960][T12023] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 219.356942][T12023] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:10 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$sndpcmc(&(0x7f0000000400)='/dev/snd/pcmC#D#c\x00', 0x100, 0x200000) ioctl$DRM_IOCTL_MODESET_CTL(r1, 0x40086408, &(0x7f0000000440)={0xef4b, 0x2}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10040}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0xf4, r4, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2d}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2f}]}, @IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2e, 0xc}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@loopback}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x22, 0x36}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xbc6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xdec}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x52fe}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4040}, 0x20000000) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x3c0}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r3, 0x1, 0x70bd2a, 0x25dfdbff, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x0) 22:14:10 executing program 4 (fault-call:0 fault-nth:78): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:10 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:10 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\x02'}) 22:14:10 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) 22:14:10 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:10 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 219.726858][T12044] FAULT_INJECTION: forcing a failure. [ 219.726858][T12044] name failslab, interval 1, probability 0, space 0, times 0 22:14:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000000)=[{{0x77359400}, 0x14, 0x0, 0x4}], 0x18) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x400) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[0xffff, 0xffffffffffffff1a, 0x0]}) [ 219.778312][T12044] CPU: 1 PID: 12044 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 219.786345][T12044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 219.796413][T12044] Call Trace: [ 219.799739][T12044] dump_stack+0x172/0x1f0 [ 219.804095][T12044] should_fail.cold+0xa/0x15 [ 219.808704][T12044] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 219.814540][T12044] ? ___might_sleep+0x163/0x280 [ 219.819425][T12044] __should_failslab+0x121/0x190 [ 219.824382][T12044] should_failslab+0x9/0x14 [ 219.828911][T12044] kmem_cache_alloc_trace+0x2d1/0x760 [ 219.834305][T12044] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 219.840140][T12044] __memcg_init_list_lru_node+0x8a/0x1e0 [ 219.845802][T12044] __list_lru_init+0x3cf/0x6e0 [ 219.850590][T12044] alloc_super+0x78d/0x890 [ 219.855029][T12044] ? test_single_super+0x10/0x10 [ 219.859984][T12044] sget_userns+0xf1/0x560 [ 219.864428][T12044] ? kill_litter_super+0x60/0x60 [ 219.869383][T12044] ? test_single_super+0x10/0x10 [ 219.874325][T12044] ? kill_litter_super+0x60/0x60 [ 219.879270][T12044] sget+0x10c/0x150 [ 219.883094][T12044] mount_bdev+0xff/0x3c0 [ 219.887343][T12044] ? load_system_files+0x7620/0x7620 [ 219.892646][T12044] ntfs_mount+0x35/0x40 [ 219.896823][T12044] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 219.902386][T12044] legacy_get_tree+0xf2/0x200 [ 219.907079][T12044] vfs_get_tree+0x123/0x450 [ 219.911603][T12044] do_mount+0x1436/0x2c40 [ 219.915948][T12044] ? copy_mount_string+0x40/0x40 [ 219.920911][T12044] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 219.927166][T12044] ? copy_mount_options+0x280/0x3a0 [ 219.932390][T12044] ksys_mount+0xdb/0x150 [ 219.936647][T12044] __x64_sys_mount+0xbe/0x150 [ 219.941380][T12044] do_syscall_64+0x103/0x610 [ 219.945993][T12044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 219.951925][T12044] RIP: 0033:0x45ad6a [ 219.955835][T12044] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 219.975455][T12044] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 219.983886][T12044] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 219.991870][T12044] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 219.999855][T12044] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 220.007844][T12044] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 220.015829][T12044] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:10 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280), 0x0) 22:14:11 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:11 executing program 4 (fault-call:0 fault-nth:79): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:11 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:11 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xf9', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 220.257918][T12063] __ntfs_error: 8 callbacks suppressed [ 220.257928][T12063] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:11 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 220.348651][T12074] FAULT_INJECTION: forcing a failure. [ 220.348651][T12074] name failslab, interval 1, probability 0, space 0, times 0 [ 220.378972][T12074] CPU: 1 PID: 12074 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 220.387006][T12074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 220.397097][T12074] Call Trace: [ 220.400414][T12074] dump_stack+0x172/0x1f0 [ 220.404777][T12074] should_fail.cold+0xa/0x15 [ 220.409415][T12074] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 220.415244][T12074] ? ___might_sleep+0x163/0x280 [ 220.420115][T12074] __should_failslab+0x121/0x190 [ 220.425095][T12074] should_failslab+0x9/0x14 [ 220.429612][T12074] kmem_cache_alloc_trace+0x2d1/0x760 [ 220.434998][T12074] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 220.440823][T12074] __memcg_init_list_lru_node+0x8a/0x1e0 [ 220.446468][T12074] __list_lru_init+0x3cf/0x6e0 [ 220.451249][T12074] alloc_super+0x78d/0x890 [ 220.455673][T12074] ? test_single_super+0x10/0x10 [ 220.460617][T12074] sget_userns+0xf1/0x560 [ 220.464953][T12074] ? kill_litter_super+0x60/0x60 [ 220.469897][T12074] ? test_single_super+0x10/0x10 [ 220.474834][T12074] ? kill_litter_super+0x60/0x60 [ 220.479779][T12074] sget+0x10c/0x150 [ 220.483598][T12074] mount_bdev+0xff/0x3c0 [ 220.487849][T12074] ? load_system_files+0x7620/0x7620 [ 220.493143][T12074] ntfs_mount+0x35/0x40 [ 220.497305][T12074] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 220.502858][T12074] legacy_get_tree+0xf2/0x200 [ 220.507546][T12074] vfs_get_tree+0x123/0x450 [ 220.512061][T12074] do_mount+0x1436/0x2c40 [ 220.516407][T12074] ? copy_mount_string+0x40/0x40 [ 220.521357][T12074] ? _copy_from_user+0xdd/0x150 [ 220.526234][T12074] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 220.532498][T12074] ? copy_mount_options+0x280/0x3a0 [ 220.537806][T12074] ksys_mount+0xdb/0x150 [ 220.542071][T12074] __x64_sys_mount+0xbe/0x150 [ 220.546775][T12074] do_syscall_64+0x103/0x610 [ 220.551387][T12074] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 220.557289][T12074] RIP: 0033:0x45ad6a [ 220.561194][T12074] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 220.580840][T12074] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 220.589357][T12074] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a 22:14:11 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x1000, 0x40000) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x80000, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000080)={0x18, 0x0, 0x6, {0xffffffff}}, 0x18) r2 = accept4$x25(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='caif0\x00', 0xfffffe73) [ 220.597347][T12074] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 220.605334][T12074] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 220.613318][T12074] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 220.621308][T12074] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x2, 0x2000028001) clock_gettime(0x6, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:11 executing program 2: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x113001, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000140)={0x7b, 0x0, [0x8, 0x100000004, 0x1, 0x8c]}) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$evdev(r1, &(0x7f00000000c0)=[{{r2, r3/1000+10000}, 0x1f, 0xd6f, 0x7}], 0xfffffffffffffe86) 22:14:11 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 220.740645][T12090] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:11 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xfc', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xf52f, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x911) 22:14:11 executing program 4 (fault-call:0 fault-nth:80): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 220.896168][T12090] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:11 executing program 1: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2000, 0x0) openat$cgroup(r0, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:11 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 221.034046][T12110] FAULT_INJECTION: forcing a failure. [ 221.034046][T12110] name failslab, interval 1, probability 0, space 0, times 0 [ 221.068869][T12110] CPU: 0 PID: 12110 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 221.076933][T12110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.087022][T12110] Call Trace: [ 221.090330][T12110] dump_stack+0x172/0x1f0 [ 221.094677][T12110] should_fail.cold+0xa/0x15 [ 221.099281][T12110] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 221.105101][T12110] ? ___might_sleep+0x163/0x280 [ 221.109977][T12110] __should_failslab+0x121/0x190 [ 221.114924][T12110] should_failslab+0x9/0x14 [ 221.119442][T12110] kmem_cache_alloc_trace+0x2d1/0x760 [ 221.124825][T12110] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 22:14:12 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 221.130652][T12110] __memcg_init_list_lru_node+0x8a/0x1e0 [ 221.136303][T12110] __list_lru_init+0x3cf/0x6e0 [ 221.141333][T12110] alloc_super+0x78d/0x890 [ 221.145746][T12110] ? test_single_super+0x10/0x10 [ 221.150766][T12110] sget_userns+0xf1/0x560 [ 221.155103][T12110] ? kill_litter_super+0x60/0x60 [ 221.160047][T12110] ? test_single_super+0x10/0x10 [ 221.164980][T12110] ? kill_litter_super+0x60/0x60 [ 221.169918][T12110] sget+0x10c/0x150 [ 221.173734][T12110] mount_bdev+0xff/0x3c0 [ 221.177981][T12110] ? load_system_files+0x7620/0x7620 [ 221.183274][T12110] ntfs_mount+0x35/0x40 [ 221.187434][T12110] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 221.192990][T12110] legacy_get_tree+0xf2/0x200 [ 221.197676][T12110] vfs_get_tree+0x123/0x450 [ 221.202188][T12110] do_mount+0x1436/0x2c40 [ 221.206565][T12110] ? copy_mount_string+0x40/0x40 [ 221.211511][T12110] ? _copy_from_user+0xdd/0x150 [ 221.216369][T12110] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.222614][T12110] ? copy_mount_options+0x280/0x3a0 [ 221.227820][T12110] ksys_mount+0xdb/0x150 [ 221.232074][T12110] __x64_sys_mount+0xbe/0x150 [ 221.236759][T12110] do_syscall_64+0x103/0x610 [ 221.241358][T12110] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.247250][T12110] RIP: 0033:0x45ad6a [ 221.251146][T12110] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 221.270768][T12110] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 221.279189][T12110] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 221.287181][T12110] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 221.295177][T12110] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 221.303172][T12110] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 221.311167][T12110] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:12 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)=0x135d) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$P9_RWRITE(r1, &(0x7f0000000040)={0xb, 0x77, 0x1, 0x6}, 0xb) 22:14:12 executing program 4 (fault-call:0 fault-nth:81): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 221.453670][T12120] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:12 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) sendfile(r4, r3, 0x0, 0x10001) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, r5) sendmmsg(r4, &(0x7f0000002dc0)=[{{&(0x7f0000001440)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000003c0), 0x3d8000}], 0x1}}], 0x1, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:12 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:12 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xfd', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:12 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 221.619732][T12132] FAULT_INJECTION: forcing a failure. [ 221.619732][T12132] name failslab, interval 1, probability 0, space 0, times 0 [ 221.657927][T12132] CPU: 0 PID: 12132 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 221.665959][T12132] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 221.676020][T12132] Call Trace: [ 221.679342][T12132] dump_stack+0x172/0x1f0 [ 221.683701][T12132] should_fail.cold+0xa/0x15 [ 221.688326][T12132] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 221.694162][T12132] ? ___might_sleep+0x163/0x280 [ 221.699059][T12132] __should_failslab+0x121/0x190 [ 221.704017][T12132] should_failslab+0x9/0x14 [ 221.708543][T12132] kmem_cache_alloc_trace+0x2d1/0x760 [ 221.713942][T12132] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 221.719803][T12132] __memcg_init_list_lru_node+0x8a/0x1e0 [ 221.725481][T12132] __list_lru_init+0x3cf/0x6e0 [ 221.730276][T12132] alloc_super+0x78d/0x890 [ 221.734715][T12132] ? test_single_super+0x10/0x10 [ 221.739676][T12132] sget_userns+0xf1/0x560 [ 221.744038][T12132] ? kill_litter_super+0x60/0x60 [ 221.749003][T12132] ? test_single_super+0x10/0x10 [ 221.753958][T12132] ? kill_litter_super+0x60/0x60 [ 221.760427][T12132] sget+0x10c/0x150 [ 221.764259][T12132] mount_bdev+0xff/0x3c0 [ 221.768596][T12132] ? load_system_files+0x7620/0x7620 [ 221.773890][T12132] ntfs_mount+0x35/0x40 [ 221.778067][T12132] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 221.783642][T12132] legacy_get_tree+0xf2/0x200 [ 221.788337][T12132] vfs_get_tree+0x123/0x450 [ 221.792862][T12132] do_mount+0x1436/0x2c40 [ 221.797222][T12132] ? copy_mount_string+0x40/0x40 [ 221.802180][T12132] ? _copy_from_user+0xdd/0x150 [ 221.807056][T12132] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 221.813312][T12132] ? copy_mount_options+0x280/0x3a0 [ 221.818524][T12132] ksys_mount+0xdb/0x150 [ 221.822780][T12132] __x64_sys_mount+0xbe/0x150 [ 221.827475][T12132] do_syscall_64+0x103/0x610 [ 221.832083][T12132] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 221.837980][T12132] RIP: 0033:0x45ad6a [ 221.841982][T12132] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 221.861595][T12132] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 221.870019][T12132] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 221.878014][T12132] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 221.886000][T12132] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 221.893992][T12132] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 221.901976][T12132] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:12 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:12 executing program 4 (fault-call:0 fault-nth:82): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:12 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x800, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000180)={&(0x7f0000000040)=@in={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000080)="87", 0x1}], 0x1, &(0x7f0000000100)=[@dstaddrv6={0x20, 0x84, 0x8, @local}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x3f}}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x3}}], 0x50, 0x4008000}, 0x40000) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:12 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000040)={0x18, 0xd, 0x2, {{0x4, 0x4, 0x3}, 0x4}}, 0x18) write$evdev(r0, &(0x7f0000000080)=[{{0x0, 0x2710}, 0x16, 0x80000000, 0x8}, {{}, 0x14, 0x4, 0xa}, {{}, 0x22, 0x3fdfffe, 0x680000}, {{0x0, 0x2710}, 0x15, 0x5, 0x5}, {{0x77359400}, 0x5c68db13e44c9d5c, 0x4, 0x6}], 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) [ 222.057265][T12148] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:13 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 222.187461][T12148] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 222.197311][T12156] FAULT_INJECTION: forcing a failure. [ 222.197311][T12156] name failslab, interval 1, probability 0, space 0, times 0 [ 222.220869][T12156] CPU: 1 PID: 12156 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 222.229016][T12156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.239092][T12156] Call Trace: [ 222.242419][T12156] dump_stack+0x172/0x1f0 [ 222.246804][T12156] should_fail.cold+0xa/0x15 [ 222.251420][T12156] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 222.257257][T12156] ? ___might_sleep+0x163/0x280 [ 222.262135][T12156] __should_failslab+0x121/0x190 [ 222.267090][T12156] should_failslab+0x9/0x14 [ 222.271610][T12156] kmem_cache_alloc_trace+0x2d1/0x760 [ 222.277032][T12156] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 222.282885][T12156] __memcg_init_list_lru_node+0x8a/0x1e0 [ 222.288547][T12156] __list_lru_init+0x3cf/0x6e0 [ 222.293367][T12156] alloc_super+0x78d/0x890 [ 222.297806][T12156] ? test_single_super+0x10/0x10 [ 222.302765][T12156] sget_userns+0xf1/0x560 [ 222.307119][T12156] ? kill_litter_super+0x60/0x60 [ 222.312081][T12156] ? test_single_super+0x10/0x10 [ 222.317040][T12156] ? kill_litter_super+0x60/0x60 [ 222.321998][T12156] sget+0x10c/0x150 [ 222.325834][T12156] mount_bdev+0xff/0x3c0 [ 222.330098][T12156] ? load_system_files+0x7620/0x7620 [ 222.335408][T12156] ntfs_mount+0x35/0x40 [ 222.339589][T12156] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 222.345161][T12156] legacy_get_tree+0xf2/0x200 [ 222.349874][T12156] vfs_get_tree+0x123/0x450 [ 222.354401][T12156] do_mount+0x1436/0x2c40 [ 222.358764][T12156] ? copy_mount_string+0x40/0x40 [ 222.363732][T12156] ? _copy_from_user+0xdd/0x150 [ 222.368610][T12156] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.374876][T12156] ? copy_mount_options+0x280/0x3a0 [ 222.380106][T12156] ksys_mount+0xdb/0x150 [ 222.384379][T12156] __x64_sys_mount+0xbe/0x150 [ 222.389089][T12156] do_syscall_64+0x103/0x610 [ 222.393723][T12156] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.399638][T12156] RIP: 0033:0x45ad6a [ 222.403651][T12156] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 222.424630][T12156] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 222.433440][T12156] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 222.443233][T12156] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 222.451236][T12156] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 222.459319][T12156] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 222.467330][T12156] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:13 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x7f', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:13 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x18400, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0xc456}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000140)={r1, 0x401, 0x74, 0xfff, 0x3, 0x18000}, 0x14) r2 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x23c, 0x27fff) fsetxattr$security_smack_transmute(r2, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0x4, 0x2) write$evdev(r2, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:13 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:13 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:13 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='fd\x00') ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000040)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) recvfrom$packet(r1, &(0x7f0000000040), 0x0, 0x20, &(0x7f00000001c0)={0x11, 0x1f, r2, 0x1, 0x81, 0x6, @random="8e5ac26eb7d3"}, 0x14) 22:14:13 executing program 4 (fault-call:0 fault-nth:83): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:13 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x18000, 0x100) write$P9_RVERSION(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="1500000065ffff7a0d0000080039503230305b635f22fa1776d0ad4dc9166c9782a42c656097bc38d0df7e3a0dda5a2987b71fa584f081c0d517e1ef1ec1538ae2ff3d023e2a3b42ff6b93827f3a1543a3a879ecee8c000000"], 0x15) [ 222.647782][T12178] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 222.780429][T12186] FAULT_INJECTION: forcing a failure. [ 222.780429][T12186] name failslab, interval 1, probability 0, space 0, times 0 [ 222.798383][T12178] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 222.813318][T12186] CPU: 1 PID: 12186 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 222.821362][T12186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 222.831440][T12186] Call Trace: [ 222.834850][T12186] dump_stack+0x172/0x1f0 [ 222.839232][T12186] should_fail.cold+0xa/0x15 [ 222.843859][T12186] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 222.849696][T12186] ? ___might_sleep+0x163/0x280 [ 222.854595][T12186] __should_failslab+0x121/0x190 [ 222.859590][T12186] should_failslab+0x9/0x14 [ 222.864114][T12186] kmem_cache_alloc_trace+0x2d1/0x760 [ 222.869501][T12186] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 222.875331][T12186] __memcg_init_list_lru_node+0x8a/0x1e0 22:14:13 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:13 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x8c', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 222.875353][T12186] __list_lru_init+0x3cf/0x6e0 [ 222.875372][T12186] alloc_super+0x78d/0x890 [ 222.875388][T12186] ? test_single_super+0x10/0x10 [ 222.875403][T12186] sget_userns+0xf1/0x560 [ 222.875416][T12186] ? kill_litter_super+0x60/0x60 [ 222.875430][T12186] ? test_single_super+0x10/0x10 [ 222.875450][T12186] ? kill_litter_super+0x60/0x60 [ 222.885870][T12186] sget+0x10c/0x150 [ 222.885888][T12186] mount_bdev+0xff/0x3c0 [ 222.885902][T12186] ? load_system_files+0x7620/0x7620 22:14:13 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x15}], 0x9) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x7, 0x200003) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x9}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="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"], &(0x7f0000000340)=0xffffff81) openat$cgroup_procs(r1, &(0x7f0000000300)='cgroup.procs\x00', 0x2, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xc1bdd13314b6e0c4, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) write$P9_RCLUNK(r3, &(0x7f0000000040)={0x7, 0x79, 0x1}, 0x7) [ 222.885919][T12186] ntfs_mount+0x35/0x40 [ 222.885933][T12186] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 222.885952][T12186] legacy_get_tree+0xf2/0x200 [ 222.885969][T12186] vfs_get_tree+0x123/0x450 [ 222.885984][T12186] do_mount+0x1436/0x2c40 [ 222.886004][T12186] ? copy_mount_string+0x40/0x40 [ 222.895941][T12186] ? _copy_from_user+0xdd/0x150 [ 222.895964][T12186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 222.895979][T12186] ? copy_mount_options+0x280/0x3a0 [ 222.895997][T12186] ksys_mount+0xdb/0x150 22:14:13 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 222.896014][T12186] __x64_sys_mount+0xbe/0x150 [ 222.896034][T12186] do_syscall_64+0x103/0x610 [ 222.896057][T12186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 222.905318][T12186] RIP: 0033:0x45ad6a [ 222.905334][T12186] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 222.905342][T12186] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 222.905356][T12186] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 222.905365][T12186] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 222.905374][T12186] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 222.905382][T12186] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 222.905391][T12186] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:13 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:14 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040)=0x100, 0x4) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:14 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:14 executing program 4 (fault-call:0 fault-nth:84): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 223.256687][T12212] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:14 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x97', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:14 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:14 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x80000001, 0x2) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000040)={0x3f, 0x1}) 22:14:14 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x4c2000, 0x0) shmget(0x1, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) getpeername$netlink(r1, &(0x7f0000000100), &(0x7f0000000140)=0xc) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r1, 0x631, 0x11, r1}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) [ 223.420585][T12221] FAULT_INJECTION: forcing a failure. [ 223.420585][T12221] name failslab, interval 1, probability 0, space 0, times 0 [ 223.442931][T12212] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 223.478969][T12221] CPU: 0 PID: 12221 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 223.487011][T12221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 223.497085][T12221] Call Trace: [ 223.500409][T12221] dump_stack+0x172/0x1f0 [ 223.504774][T12221] should_fail.cold+0xa/0x15 [ 223.509398][T12221] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 223.515249][T12221] ? ___might_sleep+0x163/0x280 [ 223.520141][T12221] __should_failslab+0x121/0x190 [ 223.525150][T12221] should_failslab+0x9/0x14 [ 223.529720][T12221] kmem_cache_alloc_node_trace+0x270/0x720 [ 223.535558][T12221] ? kmem_cache_alloc_trace+0x354/0x760 [ 223.541141][T12221] __kmalloc_node+0x3d/0x70 [ 223.545672][T12221] kvmalloc_node+0x68/0x100 [ 223.550219][T12221] __list_lru_init+0x4a6/0x6e0 [ 223.555011][T12221] alloc_super+0x78d/0x890 [ 223.559446][T12221] ? test_single_super+0x10/0x10 [ 223.564408][T12221] sget_userns+0xf1/0x560 [ 223.568760][T12221] ? kill_litter_super+0x60/0x60 [ 223.573716][T12221] ? test_single_super+0x10/0x10 [ 223.578671][T12221] ? kill_litter_super+0x60/0x60 [ 223.583625][T12221] sget+0x10c/0x150 [ 223.587460][T12221] mount_bdev+0xff/0x3c0 [ 223.591717][T12221] ? load_system_files+0x7620/0x7620 [ 223.597031][T12221] ntfs_mount+0x35/0x40 [ 223.601224][T12221] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 223.606799][T12221] legacy_get_tree+0xf2/0x200 [ 223.611502][T12221] vfs_get_tree+0x123/0x450 [ 223.616032][T12221] do_mount+0x1436/0x2c40 [ 223.620393][T12221] ? copy_mount_string+0x40/0x40 [ 223.625371][T12221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 223.631634][T12221] ? copy_mount_options+0x280/0x3a0 [ 223.636860][T12221] ksys_mount+0xdb/0x150 [ 223.641127][T12221] __x64_sys_mount+0xbe/0x150 [ 223.645833][T12221] do_syscall_64+0x103/0x610 [ 223.650454][T12221] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 223.656364][T12221] RIP: 0033:0x45ad6a [ 223.660274][T12221] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 22:14:14 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 223.679890][T12221] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 223.688317][T12221] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 223.696301][T12221] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 223.704286][T12221] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 223.712275][T12221] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 223.720260][T12221] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:14 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:14 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:14 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x400001, 0x0) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f0000000040)) syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000100), 0x0) 22:14:14 executing program 4 (fault-call:0 fault-nth:85): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:14 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:14 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x55) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x240, 0x0) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000040)=0x6) 22:14:14 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xf6', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:14 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:14 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x7, 0x10240) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x402, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) [ 224.105347][T12263] Unknown ioctl 1074033723 [ 224.120541][T12257] FAULT_INJECTION: forcing a failure. [ 224.120541][T12257] name failslab, interval 1, probability 0, space 0, times 0 [ 224.159762][T12257] CPU: 1 PID: 12257 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 224.167809][T12257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.177881][T12257] Call Trace: [ 224.181221][T12257] dump_stack+0x172/0x1f0 [ 224.185595][T12257] should_fail.cold+0xa/0x15 [ 224.190227][T12257] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 224.196067][T12257] ? ___might_sleep+0x163/0x280 [ 224.200949][T12257] __should_failslab+0x121/0x190 [ 224.205916][T12257] should_failslab+0x9/0x14 [ 224.210452][T12257] kmem_cache_alloc_trace+0x2d1/0x760 [ 224.215858][T12257] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 224.221741][T12257] __memcg_init_list_lru_node+0x8a/0x1e0 [ 224.227430][T12257] __list_lru_init+0x3cf/0x6e0 [ 224.232235][T12257] alloc_super+0x78d/0x890 [ 224.236683][T12257] ? test_single_super+0x10/0x10 [ 224.241653][T12257] sget_userns+0xf1/0x560 [ 224.246008][T12257] ? kill_litter_super+0x60/0x60 [ 224.250969][T12257] ? test_single_super+0x10/0x10 [ 224.255931][T12257] ? kill_litter_super+0x60/0x60 [ 224.260925][T12257] sget+0x10c/0x150 [ 224.264770][T12257] mount_bdev+0xff/0x3c0 [ 224.269036][T12257] ? load_system_files+0x7620/0x7620 [ 224.274345][T12257] ntfs_mount+0x35/0x40 [ 224.278533][T12257] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 224.284109][T12257] legacy_get_tree+0xf2/0x200 [ 224.288811][T12257] vfs_get_tree+0x123/0x450 [ 224.293344][T12257] do_mount+0x1436/0x2c40 [ 224.297705][T12257] ? copy_mount_string+0x40/0x40 [ 224.302677][T12257] ? _copy_from_user+0xdd/0x150 [ 224.307567][T12257] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.313833][T12257] ? copy_mount_options+0x280/0x3a0 [ 224.319066][T12257] ksys_mount+0xdb/0x150 [ 224.323337][T12257] __x64_sys_mount+0xbe/0x150 [ 224.328041][T12257] do_syscall_64+0x103/0x610 [ 224.332663][T12257] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.338574][T12257] RIP: 0033:0x45ad6a [ 224.342483][T12257] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 224.362102][T12257] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 224.370530][T12257] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 224.378520][T12257] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 224.386596][T12257] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 224.394584][T12257] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 224.402572][T12257] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 224.435816][T12263] Unknown ioctl 1074033723 22:14:15 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:15 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:15 executing program 1: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x52001, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x401, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:15 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffbff, 0x1) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:15 executing program 4 (fault-call:0 fault-nth:86): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:15 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x80000, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f00000000c0)) write$apparmor_current(r2, &(0x7f0000000040)=ANY=[@ANYBLOB='ch^\fGu\x00\x00\x00\x00\x00\x00'], 0x16) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:15 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:15 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xfd', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:15 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000100)=0xfffffffffffffea0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 22:14:15 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:15 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:15 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x4003, 0x0) pipe(&(0x7f0000000480)) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000100)=0x4, 0x4) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r3 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x1, 0x40800) write$FUSE_LK(r1, &(0x7f00000000c0)={0x28, 0xfffffffffffffff5, 0x2, {{0x1, 0x400, 0x3, r2}}}, 0x28) r4 = accept4$packet(r1, &(0x7f0000000140), &(0x7f0000000180)=0x14, 0x80000) ioctl$KVM_GET_SREGS(r1, 0x8138ae83, &(0x7f0000000300)) epoll_pwait(r3, &(0x7f0000000040)=[{}, {}, {}, {}], 0x4, 0x7, &(0x7f0000000440)={0x100000001}, 0x8) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000)=0x7, 0x4) setsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000000240)=0x1, 0x4) write$UHID_GET_REPORT_REPLY(r4, &(0x7f00000001c0)={0xa, 0x0, 0x0, 0x8}, 0xa) [ 224.747977][T12294] FAULT_INJECTION: forcing a failure. [ 224.747977][T12294] name failslab, interval 1, probability 0, space 0, times 0 [ 224.819928][T12294] CPU: 1 PID: 12294 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 224.827969][T12294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 224.838041][T12294] Call Trace: [ 224.841358][T12294] dump_stack+0x172/0x1f0 [ 224.845728][T12294] should_fail.cold+0xa/0x15 [ 224.850355][T12294] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 224.856196][T12294] ? ___might_sleep+0x163/0x280 [ 224.861090][T12294] __should_failslab+0x121/0x190 [ 224.866058][T12294] should_failslab+0x9/0x14 [ 224.870587][T12294] kmem_cache_alloc_trace+0x2d1/0x760 [ 224.875985][T12294] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 224.881825][T12294] __memcg_init_list_lru_node+0x8a/0x1e0 [ 224.887492][T12294] __list_lru_init+0x3cf/0x6e0 [ 224.893268][T12294] alloc_super+0x78d/0x890 [ 224.897718][T12294] ? test_single_super+0x10/0x10 [ 224.902683][T12294] sget_userns+0xf1/0x560 [ 224.907044][T12294] ? kill_litter_super+0x60/0x60 [ 224.912042][T12294] ? test_single_super+0x10/0x10 [ 224.916999][T12294] ? kill_litter_super+0x60/0x60 [ 224.921969][T12294] sget+0x10c/0x150 [ 224.925806][T12294] mount_bdev+0xff/0x3c0 [ 224.930072][T12294] ? load_system_files+0x7620/0x7620 [ 224.935381][T12294] ntfs_mount+0x35/0x40 [ 224.939563][T12294] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 224.945164][T12294] legacy_get_tree+0xf2/0x200 [ 224.949890][T12294] vfs_get_tree+0x123/0x450 [ 224.954419][T12294] do_mount+0x1436/0x2c40 [ 224.958782][T12294] ? copy_mount_string+0x40/0x40 [ 224.963758][T12294] ? _copy_from_user+0xdd/0x150 [ 224.968640][T12294] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 224.974909][T12294] ? copy_mount_options+0x280/0x3a0 [ 224.980134][T12294] ksys_mount+0xdb/0x150 [ 224.984411][T12294] __x64_sys_mount+0xbe/0x150 [ 224.989119][T12294] do_syscall_64+0x103/0x610 [ 224.993748][T12294] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 224.999661][T12294] RIP: 0033:0x45ad6a [ 225.003577][T12294] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 225.023209][T12294] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 225.031641][T12294] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 225.039626][T12294] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 225.047610][T12294] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 225.055594][T12294] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 225.063581][T12294] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x1, r1}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400000) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:16 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:16 executing program 4 (fault-call:0 fault-nth:87): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) r1 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000001c0)=0x14, 0x800) r2 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000200)={0x28, 0x0, 0xffffffff}, 0x10, 0x800) bind(r1, &(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x1, 0x2, 0x3, {0xa, 0x4e20, 0x2f7, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}}, 0x80) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000140)={0x0, 0x9, 0x5, [], &(0x7f0000000100)=0x7}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x66000, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f0000000040)={0x6, {{0xa, 0x4e20, 0x2, @loopback, 0xfc}}}, 0x88) 22:14:16 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:16 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x02\x00'}) 22:14:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080), 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udplite6\x00') ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000000300)={0x0, 0x0, 0x2080}) dup3(r0, r0, 0x80000) io_setup(0x401, &(0x7f0000000040)=0x0) io_destroy(r2) [ 225.472349][T12329] __ntfs_error: 6 callbacks suppressed [ 225.472359][T12329] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 225.491763][T12327] FAULT_INJECTION: forcing a failure. [ 225.491763][T12327] name failslab, interval 1, probability 0, space 0, times 0 [ 225.532051][T12327] CPU: 1 PID: 12327 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 225.540086][T12327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.540093][T12327] Call Trace: [ 225.540121][T12327] dump_stack+0x172/0x1f0 [ 225.540147][T12327] should_fail.cold+0xa/0x15 [ 225.562435][T12327] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 225.562455][T12327] ? ___might_sleep+0x163/0x280 [ 225.562473][T12327] __should_failslab+0x121/0x190 [ 225.562493][T12327] should_failslab+0x9/0x14 [ 225.582626][T12327] kmem_cache_alloc_trace+0x2d1/0x760 [ 225.588023][T12327] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 225.588046][T12327] __memcg_init_list_lru_node+0x8a/0x1e0 [ 225.588066][T12327] __list_lru_init+0x3cf/0x6e0 [ 225.599537][T12327] alloc_super+0x78d/0x890 [ 225.599554][T12327] ? test_single_super+0x10/0x10 [ 225.599567][T12327] sget_userns+0xf1/0x560 [ 225.599580][T12327] ? kill_litter_super+0x60/0x60 [ 225.599594][T12327] ? test_single_super+0x10/0x10 [ 225.599604][T12327] ? kill_litter_super+0x60/0x60 [ 225.599624][T12327] sget+0x10c/0x150 [ 225.636667][T12327] mount_bdev+0xff/0x3c0 [ 225.641096][T12327] ? load_system_files+0x7620/0x7620 [ 225.641114][T12327] ntfs_mount+0x35/0x40 [ 225.641129][T12327] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 225.641153][T12327] legacy_get_tree+0xf2/0x200 [ 225.650613][T12327] vfs_get_tree+0x123/0x450 [ 225.650629][T12327] do_mount+0x1436/0x2c40 [ 225.650648][T12327] ? copy_mount_string+0x40/0x40 [ 225.650671][T12327] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 225.650683][T12327] ? copy_mount_options+0x280/0x3a0 [ 225.650701][T12327] ksys_mount+0xdb/0x150 [ 225.690591][T12327] __x64_sys_mount+0xbe/0x150 [ 225.695297][T12327] do_syscall_64+0x103/0x610 [ 225.699915][T12327] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.705826][T12327] RIP: 0033:0x45ad6a [ 225.709744][T12327] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 22:14:16 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 225.729371][T12327] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 225.737804][T12327] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 225.745797][T12327] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 225.753783][T12327] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 225.763087][T12327] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 225.771076][T12327] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) [ 225.805305][T12337] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:16 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x03\x00'}) 22:14:16 executing program 4 (fault-call:0 fault-nth:88): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 225.930166][T12346] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 225.946061][T12337] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x1, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:16 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x04\x00'}) 22:14:16 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3, 0x4000) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000080)=0x8) write$evdev(r0, &(0x7f0000000000)=[{{}, 0x14}], 0x18) [ 226.060732][T12356] FAULT_INJECTION: forcing a failure. [ 226.060732][T12356] name failslab, interval 1, probability 0, space 0, times 0 [ 226.080246][T12346] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 226.114170][T12356] CPU: 1 PID: 12356 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 226.122234][T12356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.132340][T12356] Call Trace: [ 226.135681][T12356] dump_stack+0x172/0x1f0 [ 226.140046][T12356] should_fail.cold+0xa/0x15 [ 226.144690][T12356] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 226.150560][T12356] ? ___might_sleep+0x163/0x280 [ 226.155457][T12356] __should_failslab+0x121/0x190 [ 226.160419][T12356] should_failslab+0x9/0x14 [ 226.164944][T12356] kmem_cache_alloc_trace+0x2d1/0x760 [ 226.170364][T12356] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 226.176230][T12356] __memcg_init_list_lru_node+0x8a/0x1e0 [ 226.181896][T12356] __list_lru_init+0x3cf/0x6e0 [ 226.186689][T12356] alloc_super+0x78d/0x890 [ 226.191136][T12356] ? test_single_super+0x10/0x10 [ 226.196104][T12356] sget_userns+0xf1/0x560 [ 226.200461][T12356] ? kill_litter_super+0x60/0x60 [ 226.205421][T12356] ? test_single_super+0x10/0x10 [ 226.210379][T12356] ? kill_litter_super+0x60/0x60 [ 226.215336][T12356] sget+0x10c/0x150 [ 226.219174][T12356] mount_bdev+0xff/0x3c0 [ 226.223445][T12356] ? load_system_files+0x7620/0x7620 [ 226.228765][T12356] ntfs_mount+0x35/0x40 [ 226.232941][T12356] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 226.238518][T12356] legacy_get_tree+0xf2/0x200 [ 226.243230][T12356] vfs_get_tree+0x123/0x450 [ 226.247763][T12356] do_mount+0x1436/0x2c40 [ 226.252125][T12356] ? copy_mount_string+0x40/0x40 [ 226.257086][T12356] ? copy_mount_options+0x1ea/0x3a0 [ 226.262315][T12356] ? copy_mount_options+0x1f3/0x3a0 [ 226.267538][T12356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 226.273804][T12356] ? copy_mount_options+0x280/0x3a0 [ 226.279030][T12356] ksys_mount+0xdb/0x150 [ 226.283304][T12356] __x64_sys_mount+0xbe/0x150 [ 226.288011][T12356] do_syscall_64+0x103/0x610 [ 226.292626][T12356] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.298569][T12356] RIP: 0033:0x45ad6a [ 226.302477][T12356] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 226.322093][T12356] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 226.330521][T12356] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 226.338506][T12356] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 226.346494][T12356] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 226.354503][T12356] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 226.362488][T12356] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:17 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 226.394833][T12365] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:17 executing program 4 (fault-call:0 fault-nth:89): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:17 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x05\x00'}) 22:14:17 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x82, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f0000000040)={@mcast2}, &(0x7f0000000080)=0x14) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{}, {0x20, '/dev/dlm_plock\x00'}, {0x20, '/dev/dlm_plock\x00'}], 0xa, "1cee740a3018c9e8ad5c56d49c37776a47cfa350cbfb3f631e8f8e5607b51329e604270a79a8f63f96e2f62e7825463f9b5b7ce1dc492ba317c8cd6bdb25bef5634b155441c37b7786128b48428e37837d7c9f58fda4ad98ed255f169692c841294985bc79c817e076d70ab86dfa7c0f5414a8c085c83d1acaa998a1bcb1724353227c90e08ee9b1e6c7d7ccea6d2b97dacdacf45e316b1dd2cf97d7d72fd216b21bde1fa02c7f94b8e20ec454d49a7772d160c124b3a7"}, 0xe3) [ 226.496016][T12373] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 226.519567][T12365] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:17 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x5, 0x801) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000000)={0x4, 0x4, 0x2, 0x1ff, 0x3f, 0x2}) 22:14:17 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x06\x00'}) 22:14:17 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 226.680616][T12379] FAULT_INJECTION: forcing a failure. [ 226.680616][T12379] name failslab, interval 1, probability 0, space 0, times 0 [ 226.711831][T12373] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 226.715015][T12379] CPU: 0 PID: 12379 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 226.728672][T12379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.738741][T12379] Call Trace: [ 226.742082][T12379] dump_stack+0x172/0x1f0 [ 226.746439][T12379] should_fail.cold+0xa/0x15 [ 226.751057][T12379] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 226.756891][T12379] ? ___might_sleep+0x163/0x280 [ 226.762237][T12379] __should_failslab+0x121/0x190 [ 226.767673][T12379] should_failslab+0x9/0x14 [ 226.772237][T12379] kmem_cache_alloc_trace+0x2d1/0x760 [ 226.777656][T12379] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 226.783523][T12379] __memcg_init_list_lru_node+0x8a/0x1e0 [ 226.789186][T12379] __list_lru_init+0x3cf/0x6e0 [ 226.793994][T12379] alloc_super+0x78d/0x890 [ 226.798433][T12379] ? test_single_super+0x10/0x10 [ 226.803399][T12379] sget_userns+0xf1/0x560 [ 226.807747][T12379] ? kill_litter_super+0x60/0x60 [ 226.812706][T12379] ? test_single_super+0x10/0x10 [ 226.817671][T12379] ? kill_litter_super+0x60/0x60 [ 226.822681][T12379] sget+0x10c/0x150 [ 226.826519][T12379] mount_bdev+0xff/0x3c0 [ 226.830805][T12379] ? load_system_files+0x7620/0x7620 [ 226.836119][T12379] ntfs_mount+0x35/0x40 [ 226.840317][T12379] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 226.845889][T12379] legacy_get_tree+0xf2/0x200 [ 226.850595][T12379] vfs_get_tree+0x123/0x450 [ 226.855125][T12379] do_mount+0x1436/0x2c40 [ 226.859494][T12379] ? copy_mount_string+0x40/0x40 [ 226.864466][T12379] ? _copy_from_user+0xdd/0x150 [ 226.869345][T12379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 226.875615][T12379] ? copy_mount_options+0x280/0x3a0 [ 226.880841][T12379] ksys_mount+0xdb/0x150 [ 226.885138][T12379] __x64_sys_mount+0xbe/0x150 [ 226.890775][T12379] do_syscall_64+0x103/0x610 [ 226.895400][T12379] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.901313][T12379] RIP: 0033:0x45ad6a [ 226.905257][T12379] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 226.924894][T12379] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 226.933335][T12379] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 226.941412][T12379] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 226.949400][T12379] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 226.957388][T12379] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 226.965380][T12379] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:17 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x180000000000002, 0x100000028001) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7, 0x8000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x90, r2, 0x300, 0x70bd2b, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3fd0}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xd67}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x90}, 0x1, 0x0, 0x0, 0x40000}, 0x4004) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:17 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\a\x00'}) 22:14:17 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 227.070062][T12394] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:18 executing program 1: open(&(0x7f00000002c0)='./file0/../file0\x00', 0x4000, 0x80) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x1, 0x40042) write$evdev(r0, &(0x7f0000000280), 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x120) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000080)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r1, 0xc018620b, &(0x7f0000000100)={r2}) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000140)) mkdir(&(0x7f0000000000)='./file0\x00', 0x80) 22:14:18 executing program 4 (fault-call:0 fault-nth:90): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:18 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/227) 22:14:18 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:18 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\x03'}) 22:14:18 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 227.282814][T12414] FAULT_INJECTION: forcing a failure. [ 227.282814][T12414] name failslab, interval 1, probability 0, space 0, times 0 [ 227.325347][T12414] CPU: 0 PID: 12414 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 227.333472][T12414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 227.343545][T12414] Call Trace: [ 227.346871][T12414] dump_stack+0x172/0x1f0 [ 227.351249][T12414] should_fail.cold+0xa/0x15 [ 227.355872][T12414] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 227.361710][T12414] ? ___might_sleep+0x163/0x280 [ 227.366588][T12414] __should_failslab+0x121/0x190 [ 227.371546][T12414] should_failslab+0x9/0x14 [ 227.376050][T12414] kmem_cache_alloc_trace+0x2d1/0x760 [ 227.381880][T12414] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 227.387720][T12414] __memcg_init_list_lru_node+0x8a/0x1e0 [ 227.393446][T12414] __list_lru_init+0x3cf/0x6e0 [ 227.398268][T12414] alloc_super+0x78d/0x890 [ 227.402718][T12414] ? test_single_super+0x10/0x10 [ 227.407681][T12414] sget_userns+0xf1/0x560 [ 227.412031][T12414] ? kill_litter_super+0x60/0x60 [ 227.416996][T12414] ? test_single_super+0x10/0x10 [ 227.421951][T12414] ? kill_litter_super+0x60/0x60 [ 227.426905][T12414] sget+0x10c/0x150 [ 227.430737][T12414] mount_bdev+0xff/0x3c0 [ 227.434999][T12414] ? load_system_files+0x7620/0x7620 [ 227.440312][T12414] ntfs_mount+0x35/0x40 [ 227.444490][T12414] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 227.450057][T12414] legacy_get_tree+0xf2/0x200 [ 227.454758][T12414] vfs_get_tree+0x123/0x450 [ 227.459286][T12414] do_mount+0x1436/0x2c40 [ 227.459306][T12414] ? copy_mount_string+0x40/0x40 [ 227.459323][T12414] ? _copy_from_user+0xdd/0x150 22:14:18 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\x05'}) [ 227.459341][T12414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 227.459353][T12414] ? copy_mount_options+0x280/0x3a0 [ 227.459368][T12414] ksys_mount+0xdb/0x150 [ 227.459384][T12414] __x64_sys_mount+0xbe/0x150 [ 227.459404][T12414] do_syscall_64+0x103/0x610 [ 227.459429][T12414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 227.468708][T12414] RIP: 0033:0x45ad6a [ 227.468725][T12414] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 227.468732][T12414] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 227.468746][T12414] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 227.468762][T12414] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 227.508452][T12414] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 227.508461][T12414] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 227.508469][T12414] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:18 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xfffffffffffffff8, 0x400000) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000000040)={@local, @loopback, 0x0}, &(0x7f0000000080)=0xc) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f00000000c0)={r2, 0x1, 0x6, @dev={[], 0x1e}}, 0x10) 22:14:18 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_tables_matches\x00') setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000040)=0x7, 0x4) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x15, 0x2}], 0x18) 22:14:18 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\x06'}) 22:14:18 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:18 executing program 4 (fault-call:0 fault-nth:91): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:18 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:18 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) connect$ax25(r1, &(0x7f0000000040)={{0x3, @default}, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null]}, 0x48) 22:14:18 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\a'}) 22:14:18 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000140)=[{{}, 0x14, 0x1, 0x923}], 0xfce4) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3f, 0x40200) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000080)={0x5d83, 0xa, 0x4, 0x400, {}, {0x0, 0xd, 0x80000001, 0xd43, 0x8, 0x6, "2b81dcfd"}, 0xe7f, 0x5, @userptr=0x10001, 0x4}) write$evdev(r0, &(0x7f0000000000)=[{{}, 0x11, 0x5, 0x4}, {{}, 0x13, 0x20, 0x2}], 0x30) 22:14:18 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 227.959100][T12450] FAULT_INJECTION: forcing a failure. [ 227.959100][T12450] name failslab, interval 1, probability 0, space 0, times 0 [ 227.999333][T12450] CPU: 1 PID: 12450 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 228.007383][T12450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.017458][T12450] Call Trace: [ 228.020811][T12450] dump_stack+0x172/0x1f0 [ 228.025176][T12450] should_fail.cold+0xa/0x15 [ 228.029809][T12450] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 228.035648][T12450] ? ___might_sleep+0x163/0x280 [ 228.040531][T12450] __should_failslab+0x121/0x190 [ 228.045495][T12450] should_failslab+0x9/0x14 [ 228.050030][T12450] kmem_cache_alloc_trace+0x2d1/0x760 [ 228.056051][T12450] kobject_uevent_env+0x2fb/0x1030 [ 228.061296][T12450] kobject_uevent+0x20/0x26 [ 228.065837][T12450] __loop_clr_fd+0x4ee/0xd60 [ 228.070477][T12450] lo_ioctl+0x210/0x2150 [ 228.074762][T12450] ? tomoyo_domain+0xc5/0x160 [ 228.079497][T12450] ? lo_rw_aio+0x1120/0x1120 [ 228.084119][T12450] blkdev_ioctl+0x6f2/0x1d10 [ 228.088830][T12450] ? blkpg_ioctl+0xa90/0xa90 [ 228.093452][T12450] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 228.099296][T12450] ? __fget+0x35a/0x550 [ 228.103491][T12450] block_ioctl+0xee/0x130 [ 228.107841][T12450] ? blkdev_fallocate+0x410/0x410 [ 228.112919][T12450] do_vfs_ioctl+0xd6e/0x1390 [ 228.117544][T12450] ? ioctl_preallocate+0x210/0x210 [ 228.122680][T12450] ? __fget+0x381/0x550 [ 228.126959][T12450] ? ksys_dup3+0x3e0/0x3e0 [ 228.131392][T12450] ? kfree+0x173/0x230 [ 228.135478][T12450] ? kfree+0x173/0x230 [ 228.139566][T12450] ? tomoyo_file_ioctl+0x23/0x30 [ 228.144529][T12450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 228.150800][T12450] ? security_file_ioctl+0x93/0xc0 [ 228.155941][T12450] ksys_ioctl+0xab/0xd0 [ 228.160144][T12450] __x64_sys_ioctl+0x73/0xb0 [ 228.164780][T12450] do_syscall_64+0x103/0x610 [ 228.169393][T12450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.175300][T12450] RIP: 0033:0x458167 [ 228.179220][T12450] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 22:14:19 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00?'}) [ 228.198841][T12450] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 228.207272][T12450] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 0000000000458167 [ 228.215272][T12450] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 228.223269][T12450] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 228.231263][T12450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 228.239276][T12450] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:19 executing program 4 (fault-call:0 fault-nth:92): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:19 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00@'}) 22:14:19 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:19 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = socket$inet(0x2, 0x5, 0x802) recvmmsg(0xffffffffffffffff, &(0x7f0000004480)=[{{&(0x7f0000001680)=@rc, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001700)=""/252, 0xfc}, {&(0x7f0000001800)=""/96, 0x60}, {&(0x7f0000001880)}, {&(0x7f00000018c0)=""/185, 0xb9}, {&(0x7f0000001980)=""/217, 0xd9}], 0x5, &(0x7f0000001b00)=""/247, 0xf7}, 0x2}, {{0x0, 0x0, &(0x7f0000002ec0)=[{&(0x7f0000001c00)=""/53, 0x35}, {&(0x7f0000001c40)=""/229, 0xe5}, {&(0x7f0000001d40)=""/99, 0x63}, {&(0x7f0000001dc0)=""/175, 0xaf}, {&(0x7f0000001e80)=""/4096, 0x1000}, {&(0x7f0000002e80)=""/43, 0x2b}], 0x6, &(0x7f0000002f40)=""/248, 0xf8}, 0x200}, {{&(0x7f0000003040)=@ipx, 0x80, &(0x7f0000004380)=[{&(0x7f00000030c0)=""/225, 0xe1}, {&(0x7f00000031c0)=""/44, 0x2c}, {&(0x7f0000003200)=""/235, 0xeb}, {&(0x7f0000003300)=""/4096, 0x1000}, {&(0x7f0000004300)=""/128, 0x80}], 0x5}, 0x3ff}, {{&(0x7f0000004400)=@xdp={0x2c, 0x0, 0x0}, 0x80, 0xfffffffffffffffe}, 0xfffffffffffff001}], 0x4, 0x0, &(0x7f0000004580)) fstat(r0, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000004640)={{{@in6=@rand_addr="df6a6fec20dc9402babc55ffef4f4b57", @in6=@dev={0xfe, 0x80, [], 0x11}, 0x4e23, 0x6, 0x4e20, 0x5, 0x2, 0x20, 0x80, 0x2c, r2, r3}, {0x8, 0x9199, 0x7f, 0x49f, 0x81, 0x6e7, 0xff, 0xa3}, {0x0, 0x98c, 0x1ff, 0x5}, 0x800, 0x6e6bbc, 0x0, 0x1, 0x1, 0x1}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d3}, 0xa, @in6=@empty, 0x3502, 0x4, 0x0, 0xffffffffffffffff, 0x1, 0x8, 0xbf}}, 0xe8) write$evdev(r0, &(0x7f0000000280)=[{{0x77359400}, 0x10, 0x7}], 0xfffffffffffffe4a) 22:14:19 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 228.499470][T12471] FAULT_INJECTION: forcing a failure. [ 228.499470][T12471] name failslab, interval 1, probability 0, space 0, times 0 [ 228.516553][T12471] CPU: 0 PID: 12471 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 228.524596][T12471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 228.534668][T12471] Call Trace: [ 228.537978][T12471] dump_stack+0x172/0x1f0 [ 228.542329][T12471] should_fail.cold+0xa/0x15 22:14:19 executing program 2: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x200000, 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f00000000c0)={0x8, [0x2, 0x2, 0x3, 0xf4, 0x2, 0x2, 0x7ee0, 0xbd8]}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x108002, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, r2}}, {@debug={'debug', 0x3d, 0x3}}, {@posixacl='posixacl'}, {@aname={'aname', 0x3d, '@}vboxnet0+em1'}}, {@debug={'debug', 0x3d, 0x5}}], [{@obj_type={'obj_type', 0x3d, '/dev/input/event#\x00'}}, {@uid_lt={'uid<', r3}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@audit='audit'}, {@subj_role={'subj_role', 0x3d, '-procGPL'}}, {@obj_role={'obj_role', 0x3d, '{'}}]}}) r4 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r4, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) [ 228.546978][T12471] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 228.552818][T12471] ? ___might_sleep+0x163/0x280 [ 228.557694][T12471] __should_failslab+0x121/0x190 [ 228.562665][T12471] should_failslab+0x9/0x14 [ 228.567215][T12471] kmem_cache_alloc_node_trace+0x270/0x720 [ 228.573087][T12471] __kmalloc_node_track_caller+0x3d/0x70 [ 228.578758][T12471] __kmalloc_reserve.isra.0+0x40/0xf0 [ 228.584161][T12471] __alloc_skb+0x10b/0x5e0 [ 228.588625][T12471] ? skb_trim+0x190/0x190 [ 228.592987][T12471] ? kasan_check_read+0x11/0x20 [ 228.597876][T12471] alloc_uevent_skb+0x83/0x1e2 [ 228.602685][T12471] kobject_uevent_env+0xa63/0x1030 [ 228.607834][T12471] kobject_uevent+0x20/0x26 [ 228.612367][T12471] __loop_clr_fd+0x4ee/0xd60 [ 228.617165][T12471] lo_ioctl+0x210/0x2150 [ 228.621452][T12471] ? tomoyo_domain+0xc5/0x160 [ 228.626159][T12471] ? lo_rw_aio+0x1120/0x1120 [ 228.630810][T12471] blkdev_ioctl+0x6f2/0x1d10 [ 228.635437][T12471] ? blkpg_ioctl+0xa90/0xa90 [ 228.640062][T12471] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 228.645904][T12471] ? __fget+0x35a/0x550 [ 228.650187][T12471] block_ioctl+0xee/0x130 [ 228.654562][T12471] ? blkdev_fallocate+0x410/0x410 [ 228.659620][T12471] do_vfs_ioctl+0xd6e/0x1390 [ 228.664255][T12471] ? ioctl_preallocate+0x210/0x210 [ 228.669434][T12471] ? __fget+0x381/0x550 [ 228.673730][T12471] ? ksys_dup3+0x3e0/0x3e0 [ 228.678361][T12471] ? kfree+0x173/0x230 [ 228.682460][T12471] ? tomoyo_file_ioctl+0x23/0x30 [ 228.687513][T12471] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 228.693791][T12471] ? security_file_ioctl+0x93/0xc0 [ 228.698951][T12471] ksys_ioctl+0xab/0xd0 [ 228.703342][T12471] __x64_sys_ioctl+0x73/0xb0 [ 228.709082][T12471] do_syscall_64+0x103/0x610 [ 228.713979][T12471] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 228.719891][T12471] RIP: 0033:0x458167 [ 228.723834][T12471] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 228.743455][T12471] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 228.751884][T12471] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 0000000000458167 [ 228.760621][T12471] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 228.769078][T12471] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 228.777442][T12471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 228.785443][T12471] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:19 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:19 executing program 4 (fault-call:0 fault-nth:93): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:19 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:19 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffffffffffffe, 0x20400) write$evdev(r0, &(0x7f0000000280)=[{{0x77359400}, 0x18, 0x0, 0xfffffffffffffffe}], 0xfddf) 22:14:20 executing program 2: socket$nl_route(0x10, 0x3, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:20 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8400, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000040)=0x6) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x20, 0x6, 0x101, 'queue0\x00', 0x800}) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) setsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f00000001c0)="64f2ab96de33d37bc0fd80d2c0a50bd7d5266dcc34db9543fe6d9b972fdcb4baaab96041c738b687a9fb8792922f297fa8fcdfd9fd8e768b8bc28de8b829ec87feeded9885511f7d", 0x48) accept4$bt_l2cap(r0, &(0x7f0000000140), &(0x7f0000000180)=0xe, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x2) [ 229.186577][T12499] FAULT_INJECTION: forcing a failure. [ 229.186577][T12499] name failslab, interval 1, probability 0, space 0, times 0 [ 229.271799][T12499] CPU: 0 PID: 12499 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 229.279847][T12499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.289918][T12499] Call Trace: [ 229.293247][T12499] dump_stack+0x172/0x1f0 [ 229.297612][T12499] should_fail.cold+0xa/0x15 [ 229.302273][T12499] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 229.308123][T12499] ? ___might_sleep+0x163/0x280 [ 229.313005][T12499] __should_failslab+0x121/0x190 [ 229.317966][T12499] should_failslab+0x9/0x14 [ 229.322492][T12499] kmem_cache_alloc_trace+0x2d1/0x760 [ 229.327895][T12499] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 229.333742][T12499] __memcg_init_list_lru_node+0x8a/0x1e0 [ 229.339432][T12499] __list_lru_init+0x3cf/0x6e0 [ 229.344258][T12499] alloc_super+0x78d/0x890 [ 229.348698][T12499] ? test_single_super+0x10/0x10 [ 229.353660][T12499] sget_userns+0xf1/0x560 [ 229.358035][T12499] ? kill_litter_super+0x60/0x60 [ 229.362990][T12499] ? test_single_super+0x10/0x10 22:14:20 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 229.363008][T12499] ? kill_litter_super+0x60/0x60 [ 229.363027][T12499] sget+0x10c/0x150 [ 229.376756][T12499] mount_bdev+0xff/0x3c0 [ 229.381018][T12499] ? load_system_files+0x7620/0x7620 [ 229.386356][T12499] ntfs_mount+0x35/0x40 [ 229.390542][T12499] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 229.396156][T12499] legacy_get_tree+0xf2/0x200 [ 229.400901][T12499] vfs_get_tree+0x123/0x450 [ 229.400918][T12499] do_mount+0x1436/0x2c40 [ 229.400937][T12499] ? copy_mount_string+0x40/0x40 [ 229.400951][T12499] ? copy_mount_options+0x1ea/0x3a0 22:14:20 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 229.400966][T12499] ? __sanitizer_cov_trace_pc+0x18/0x50 [ 229.400981][T12499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 229.400992][T12499] ? copy_mount_options+0x280/0x3a0 [ 229.401008][T12499] ksys_mount+0xdb/0x150 [ 229.401025][T12499] __x64_sys_mount+0xbe/0x150 [ 229.401051][T12499] do_syscall_64+0x103/0x610 [ 229.437022][T12499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.437035][T12499] RIP: 0033:0x45ad6a [ 229.437061][T12499] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 229.479949][T12499] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 229.479965][T12499] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 229.479972][T12499] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 [ 229.479979][T12499] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 229.479987][T12499] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 22:14:20 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 229.479994][T12499] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:20 executing program 2: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x6, 0x81, 0xffff, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(r0, 0x8, r1) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x80, 0x80000) setsockopt$inet6_tcp_int(r2, 0x6, 0x3, &(0x7f0000000240)=0xf6, 0x4) r3 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2, 0x406400) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x101000, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r0) write$evdev(r3, &(0x7f0000000000)=[{{}, 0x14, 0x71c}], 0x18) 22:14:20 executing program 4 (fault-call:0 fault-nth:94): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:20 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:20 executing program 1: r0 = semget$private(0x0, 0x3, 0x10) semctl$GETZCNT(r0, 0x1, 0xf, &(0x7f0000000000)=""/128) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:20 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 229.699444][T12526] FAULT_INJECTION: forcing a failure. [ 229.699444][T12526] name failslab, interval 1, probability 0, space 0, times 0 [ 229.735707][T12526] CPU: 0 PID: 12526 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 229.743792][T12526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.753870][T12526] Call Trace: [ 229.757194][T12526] dump_stack+0x172/0x1f0 [ 229.763068][T12526] should_fail.cold+0xa/0x15 [ 229.767695][T12526] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 229.773539][T12526] ? ___might_sleep+0x163/0x280 [ 229.778595][T12526] __should_failslab+0x121/0x190 [ 229.783557][T12526] should_failslab+0x9/0x14 [ 229.788090][T12526] kmem_cache_alloc_trace+0x2d1/0x760 [ 229.793498][T12526] kobject_uevent_env+0x2fb/0x1030 [ 229.798684][T12526] kobject_uevent+0x20/0x26 [ 229.803228][T12526] __loop_clr_fd+0x4ee/0xd60 [ 229.807851][T12526] lo_ioctl+0x210/0x2150 [ 229.812123][T12526] ? tomoyo_domain+0xc5/0x160 [ 229.816829][T12526] ? lo_rw_aio+0x1120/0x1120 [ 229.821453][T12526] blkdev_ioctl+0x6f2/0x1d10 [ 229.826072][T12526] ? blkpg_ioctl+0xa90/0xa90 [ 229.830686][T12526] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 229.836638][T12526] ? __fget+0x35a/0x550 [ 229.840819][T12526] block_ioctl+0xee/0x130 [ 229.845267][T12526] ? blkdev_fallocate+0x410/0x410 [ 229.850319][T12526] do_vfs_ioctl+0xd6e/0x1390 [ 229.854945][T12526] ? ioctl_preallocate+0x210/0x210 [ 229.860084][T12526] ? __fget+0x381/0x550 [ 229.864272][T12526] ? ksys_dup3+0x3e0/0x3e0 [ 229.868714][T12526] ? kfree+0x173/0x230 [ 229.872836][T12526] ? kfree+0x173/0x230 [ 229.876954][T12526] ? tomoyo_file_ioctl+0x23/0x30 [ 229.881916][T12526] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 229.888181][T12526] ? security_file_ioctl+0x93/0xc0 [ 229.893346][T12526] ksys_ioctl+0xab/0xd0 [ 229.897530][T12526] __x64_sys_ioctl+0x73/0xb0 [ 229.902228][T12526] do_syscall_64+0x103/0x610 [ 229.906893][T12526] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.912813][T12526] RIP: 0033:0x458167 [ 229.916726][T12526] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 229.936369][T12526] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:14:20 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:20 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x2, 0x0) write$evdev(r0, &(0x7f0000000280), 0x0) [ 229.944891][T12526] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 0000000000458167 [ 229.952906][T12526] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 229.960893][T12526] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 229.968879][T12526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 229.976867][T12526] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:20 executing program 4 (fault-call:0 fault-nth:95): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:21 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:21 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3f, 0x40000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0x2, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r2, 0x3c, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x90) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:21 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:21 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0xfffffffffffffddd) [ 230.226544][T12549] FAULT_INJECTION: forcing a failure. [ 230.226544][T12549] name failslab, interval 1, probability 0, space 0, times 0 [ 230.253447][T12549] CPU: 1 PID: 12549 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 230.261486][T12549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.271564][T12549] Call Trace: [ 230.274891][T12549] dump_stack+0x172/0x1f0 [ 230.279273][T12549] should_fail.cold+0xa/0x15 [ 230.283904][T12549] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 230.289753][T12549] ? ___might_sleep+0x163/0x280 [ 230.294640][T12549] __should_failslab+0x121/0x190 [ 230.299610][T12549] should_failslab+0x9/0x14 [ 230.304140][T12549] kmem_cache_alloc_trace+0x2d1/0x760 [ 230.309546][T12549] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 230.315390][T12549] __memcg_init_list_lru_node+0x8a/0x1e0 [ 230.321151][T12549] __list_lru_init+0x3cf/0x6e0 [ 230.325946][T12549] alloc_super+0x78d/0x890 [ 230.330389][T12549] ? test_single_super+0x10/0x10 [ 230.335353][T12549] sget_userns+0xf1/0x560 [ 230.339743][T12549] ? kill_litter_super+0x60/0x60 [ 230.344739][T12549] ? test_single_super+0x10/0x10 [ 230.349724][T12549] ? kill_litter_super+0x60/0x60 [ 230.354689][T12549] sget+0x10c/0x150 [ 230.358534][T12549] mount_bdev+0xff/0x3c0 [ 230.362814][T12549] ? load_system_files+0x7620/0x7620 [ 230.368302][T12549] ntfs_mount+0x35/0x40 [ 230.372483][T12549] ? ntfs_rl_punch_nolock+0x1d90/0x1d90 [ 230.378057][T12549] legacy_get_tree+0xf2/0x200 [ 230.382769][T12549] vfs_get_tree+0x123/0x450 [ 230.387303][T12549] do_mount+0x1436/0x2c40 [ 230.391661][T12549] ? copy_mount_string+0x40/0x40 [ 230.396637][T12549] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.402901][T12549] ? copy_mount_options+0x280/0x3a0 [ 230.408132][T12549] ksys_mount+0xdb/0x150 [ 230.412525][T12549] __x64_sys_mount+0xbe/0x150 [ 230.417251][T12549] do_syscall_64+0x103/0x610 [ 230.421910][T12549] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.427830][T12549] RIP: 0033:0x45ad6a [ 230.431856][T12549] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 2d 8e fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0a 8e fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 230.452814][T12549] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 230.461247][T12549] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 000000000045ad6a [ 230.469415][T12549] RDX: 00007fb8aede9ae0 RSI: 0000000020000140 RDI: 00007fb8aede9b00 22:14:21 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 230.477425][T12549] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 230.485414][T12549] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000004 [ 230.493404][T12549] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:21 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:21 executing program 4 (fault-call:0 fault-nth:96): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:21 executing program 1: r0 = dup(0xffffffffffffffff) ioctl$KVM_RUN(r0, 0xae80, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x28000, 0x0) write$evdev(r1, &(0x7f0000000040), 0x0) 22:14:21 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2402, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000040)={0x7, 0x3, 0x0, 0x1000, 0x5, 0x1, 0x5, 0xffff, 0x5, 0x2, 0x2}, 0xb) 22:14:21 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 230.647390][T12572] __ntfs_error: 24 callbacks suppressed [ 230.647399][T12572] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:21 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:21 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r2 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x7, 0x4800) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f00000001c0)={0x0, 0x1, [{r2, 0x0, 0x1004000, 0xfefcb67a24beca32}]}) r3 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x14102, 0x0) epoll_create(0xced) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, &(0x7f0000000100), 0x4) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0xa01) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f0000000040)={0x8}, 0x1) ioctl$UI_ABS_SETUP(r4, 0x401c5504, &(0x7f0000000080)={0x10001, {0x4, 0x10000, 0x100000000, 0x9, 0xd7, 0xfff}}) [ 230.790271][T12582] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 230.809366][T12572] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 230.853939][T12582] FAULT_INJECTION: forcing a failure. [ 230.853939][T12582] name failslab, interval 1, probability 0, space 0, times 0 [ 230.867159][T12582] CPU: 0 PID: 12582 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 230.875179][T12582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.885505][T12582] Call Trace: [ 230.888822][T12582] dump_stack+0x172/0x1f0 [ 230.894223][T12582] should_fail.cold+0xa/0x15 [ 230.898834][T12582] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 230.904690][T12582] ? ___might_sleep+0x163/0x280 [ 230.909558][T12582] __should_failslab+0x121/0x190 [ 230.914523][T12582] should_failslab+0x9/0x14 [ 230.919046][T12582] kmem_cache_alloc+0x2b2/0x6f0 [ 230.923921][T12582] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 230.929744][T12582] ? lock_downgrade+0x880/0x880 [ 230.934630][T12582] skb_clone+0x150/0x3b0 [ 230.938901][T12582] netlink_broadcast_filtered+0x870/0xb20 [ 230.944655][T12582] netlink_broadcast+0x3a/0x50 [ 230.949433][T12582] kobject_uevent_env+0xa94/0x1030 [ 230.954575][T12582] kobject_uevent+0x20/0x26 [ 230.959100][T12582] __loop_clr_fd+0x4ee/0xd60 [ 230.963719][T12582] lo_ioctl+0x210/0x2150 [ 230.967970][T12582] ? tomoyo_domain+0xc5/0x160 [ 230.972992][T12582] ? lo_rw_aio+0x1120/0x1120 [ 230.977580][T12582] blkdev_ioctl+0x6f2/0x1d10 [ 230.982194][T12582] ? blkpg_ioctl+0xa90/0xa90 [ 230.986816][T12582] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 230.992631][T12582] ? __fget+0x35a/0x550 [ 230.996787][T12582] block_ioctl+0xee/0x130 [ 231.001124][T12582] ? blkdev_fallocate+0x410/0x410 [ 231.006161][T12582] do_vfs_ioctl+0xd6e/0x1390 [ 231.010768][T12582] ? ioctl_preallocate+0x210/0x210 [ 231.015892][T12582] ? __fget+0x381/0x550 [ 231.020078][T12582] ? ksys_dup3+0x3e0/0x3e0 [ 231.024516][T12582] ? kfree+0x173/0x230 [ 231.028709][T12582] ? kfree+0x173/0x230 [ 231.032794][T12582] ? tomoyo_file_ioctl+0x23/0x30 [ 231.037732][T12582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.043991][T12582] ? security_file_ioctl+0x93/0xc0 [ 231.049116][T12582] ksys_ioctl+0xab/0xd0 [ 231.053276][T12582] __x64_sys_ioctl+0x73/0xb0 [ 231.057916][T12582] do_syscall_64+0x103/0x610 [ 231.062532][T12582] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.068431][T12582] RIP: 0033:0x458167 [ 231.072323][T12582] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.091930][T12582] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 22:14:22 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x10d840) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x100000000, 0x0, 0x10002, 0xcb65}) mq_timedreceive(r1, &(0x7f00000000c0)=""/115, 0x73, 0x3f, &(0x7f0000000140)) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000080)={0x4, r2}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) [ 231.100394][T12582] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 0000000000458167 [ 231.108372][T12582] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 231.116358][T12582] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 231.124352][T12582] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 231.132333][T12582] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:22 executing program 4 (fault-call:0 fault-nth:97): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:22 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:22 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:22 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7f, 0x290082) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000040)={0x0, 0x0, @ioapic}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:22 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 231.347883][T12604] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 231.411723][T12604] FAULT_INJECTION: forcing a failure. [ 231.411723][T12604] name failslab, interval 1, probability 0, space 0, times 0 22:14:22 executing program 2: io_setup(0x200, &(0x7f0000000000)=0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x80, 0x0) r4 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x7, 0xffffffffffffffff, 0x10001, 0xbcef, 0x0, 0x1, 0xffff, [], 0x0, 0xffffffffffffff9c, 0xd9, 0x360}, 0x3c) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/ptmx\x00', 0x400040, 0x0) r8 = eventfd2(0x15a0, 0x0) r9 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/mixer\x00', 0x90000, 0x0) r10 = syz_open_dev$dmmidi(&(0x7f0000000780)='/dev/dmmidi#\x00', 0x9, 0x22201) pipe2(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r12 = syz_open_dev$cec(&(0x7f0000000880)='/dev/cec#\x00', 0x2, 0x2) r13 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000900)='/dev/udmabuf\x00', 0x2) r14 = syz_open_dev$mouse(&(0x7f0000000a00)='/dev/input/mouse#\x00', 0x1000, 0x24800) r15 = signalfd(0xffffffffffffffff, &(0x7f0000000a80)={0x80}, 0x8) r16 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/cachefiles\x00', 0x101002, 0x0) io_submit(r0, 0x8, &(0x7f0000000b80)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x0, r1, &(0x7f0000000080)="79b627efecb7bcf5a31249cd8bd9009a21b69018f0fd3b96bdc62c0b5b7172c25be186e3f9b7480505583b10949e467d95b7e6a6e01c5f24bfb5aca98da9957ed69722be924fb71eba7eb54828fd5b873a7410fe4fca1f0f0d2a8d46c5ed17123c82a44b5acf5ef9b977dea2edb7497e0ae02f8fd21d26565f2b42ec3aab48a5e447d294211d2bc51c6f3ebf66eb69123ad0b8fa5512991ca0d7608a1ab6cb9f20", 0xa1, 0x97, 0x0, 0x2, r2}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x3, 0x6, r3, &(0x7f0000000300)="123ab8ff7a4d2aa56b27f6e3ceec537d02e1fbd668813f6620dc491cd4ffc8573f7c828469ca70a062928b521b4772a43e8f90810338b1473f3aae46b8899aa790cb8e8c91cb448c95cee0266046ce90c4d49e4c898a7a722e025b9bfbc19b86f41d90b78698a8f545dbce18abfb5f621d4b5b0b1f6bf1f6f72a74df0e97f9eb4e068b02f0b4", 0x86, 0xe00000000000000, 0x0, 0x0, r4}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x7, r5, &(0x7f00000003c0)="7d2a5d4a40718f98984e0aad247c2a9977231f78705020dc4b81f69dade6dde98d6f848433a3eb923cbab56d64d295bd29ae15eb151ce9778bf80fe2778dbcc7c9274d054d67396484b2bc1461e2b6498923f63feaeb7e6fe6b5418ae06b81e72c732f0188a5711b9dbae3b2f582d81544c40b669b032380bece03fcb2ffd027cfac7b684ffc8b736d83cf49a5d066ca8c19886c", 0x94, 0x2, 0x0, 0x0, r6}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x6, 0x3, r7, &(0x7f0000000500)="904dd5406ef327dfb8ea204fd7f7676b69e8c2cf808df962f608c0b71307a078a9a8c41adc3dc92a0a735a1f63f921d1ef7b46004a8458a4203c414eb5940ffb0430021519ffcd3ba1b72f317f612b2a0fbe0b7123375783cb1b3d9a657c8275e31155c50c30b9ce2abc7a11c8bad43c3d15cf5cbe307b49cfd90e4ed68b9097b22d676e7bd67e2f244744f364f411a95d9f2ab167bc1907591311e83338b9cdd5307047e07f2fd2d8d8ed5e51a3c44f9f71be6feee6999f2ca9d6cbc2912b09eb50fcc386b4c6a98fa8b5b2d1e9057cd309ca83e4ea8e63ab4fb7a0a3486e28a6470f9df1360eef45c25c0c03eb882613a7c0", 0xf3, 0x8, 0x0, 0x3, r8}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0xa, 0x9, r9, &(0x7f0000000680)="d7d9630e670295f404cf3a472ec02234e7392dfbf20c20f50648f0ffadae7d61492906b3814a8776131c3c5e9602cbd89e295e540e4ebfd3e426f8c3d27fbd9f358cf2d821d2feed58f449baa57542a43f57d276ea9ad694d1aa1ee47a20685ffd54a6b3d443e47f1d69e02e3dc14d5678dbff7ff5a52688fd75f2d84bb2a0a81dbf0caf635344f94fe9b731a00b1d5ace8a0c3781aedd0ef543a291d12cdbe65e432f9427e8329966e8d8a29e3d3588b797295ea6cd46fa56d0d04b23f3e75e0ccb0185ffb8b1c93e4f88ddb57ed6fa03", 0xd1, 0x200, 0x0, 0x2, r10}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x2, 0x5f16, r11, &(0x7f0000000840), 0x0, 0x9, 0x0, 0x2, r12}, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0xf, 0x72a, r13, &(0x7f0000000940)="42c97ba712985db78110643d4fecec287621c6c0773681a364b3f126c8877d5748949250ca7bc308343113e5afe89dc3a350f348d9161c951b2f77889a5daaadb3e8b6aed873e6943668ae6ade787d87f73d2baa046431f920ad495c16cddd43833c8f2447659abf5c197100cbc8986b9745e174bec3ac6ab3741edba006e93434cec02cd9169908e2bf56d2c285797b1c8b", 0x92, 0x80000000, 0x0, 0x0, r14}, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0xb, 0xa8, r15, &(0x7f0000000ac0)="71e1d2236b45d3df0de39f9fe7c43d002a2f31bf312ed8d044a6a58a17011c2695", 0x21, 0x80, 0x0, 0x3, r16}]) r17 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r17, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) [ 231.471222][T12604] CPU: 0 PID: 12604 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 231.479261][T12604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 231.489331][T12604] Call Trace: [ 231.492647][T12604] dump_stack+0x172/0x1f0 [ 231.497010][T12604] should_fail.cold+0xa/0x15 [ 231.501635][T12604] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 231.507470][T12604] ? ___might_sleep+0x163/0x280 [ 231.512350][T12604] __should_failslab+0x121/0x190 [ 231.517313][T12604] should_failslab+0x9/0x14 [ 231.521839][T12604] kmem_cache_alloc+0x2b2/0x6f0 [ 231.526721][T12604] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 231.532550][T12604] ? lock_downgrade+0x880/0x880 [ 231.537430][T12604] skb_clone+0x150/0x3b0 [ 231.541697][T12604] netlink_broadcast_filtered+0x870/0xb20 [ 231.547457][T12604] netlink_broadcast+0x3a/0x50 [ 231.552262][T12604] kobject_uevent_env+0xa94/0x1030 [ 231.557414][T12604] kobject_uevent+0x20/0x26 [ 231.561947][T12604] __loop_clr_fd+0x4ee/0xd60 [ 231.566563][T12604] lo_ioctl+0x210/0x2150 [ 231.570833][T12604] ? tomoyo_domain+0xc5/0x160 [ 231.575529][T12604] ? lo_rw_aio+0x1120/0x1120 [ 231.580141][T12604] blkdev_ioctl+0x6f2/0x1d10 [ 231.584757][T12604] ? blkpg_ioctl+0xa90/0xa90 [ 231.589366][T12604] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 231.595224][T12604] ? __fget+0x35a/0x550 [ 231.599408][T12604] block_ioctl+0xee/0x130 [ 231.603754][T12604] ? blkdev_fallocate+0x410/0x410 [ 231.608799][T12604] do_vfs_ioctl+0xd6e/0x1390 [ 231.613445][T12604] ? ioctl_preallocate+0x210/0x210 [ 231.618583][T12604] ? __fget+0x381/0x550 [ 231.622766][T12604] ? ksys_dup3+0x3e0/0x3e0 [ 231.627208][T12604] ? kfree+0x173/0x230 [ 231.631307][T12604] ? kfree+0x173/0x230 [ 231.635399][T12604] ? tomoyo_file_ioctl+0x23/0x30 [ 231.640352][T12604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 231.646611][T12604] ? security_file_ioctl+0x93/0xc0 [ 231.651748][T12604] ksys_ioctl+0xab/0xd0 [ 231.655925][T12604] __x64_sys_ioctl+0x73/0xb0 [ 231.660540][T12604] do_syscall_64+0x103/0x610 [ 231.665161][T12604] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 231.671079][T12604] RIP: 0033:0x458167 [ 231.674995][T12604] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 231.694614][T12604] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 231.703057][T12604] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 0000000000458167 [ 231.711045][T12604] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 22:14:22 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 231.719033][T12604] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 231.727026][T12604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 231.735028][T12604] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 [ 231.766448][T12613] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:22 executing program 4 (fault-call:0 fault-nth:98): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:22 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x6, 0x22001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:22 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 231.840051][T12621] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 231.864178][T12613] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 231.878333][T12629] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:14:22 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x1000000028003) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:22 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:22 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 232.029249][T12629] FAULT_INJECTION: forcing a failure. [ 232.029249][T12629] name failslab, interval 1, probability 0, space 0, times 0 [ 232.056163][T12629] CPU: 1 PID: 12629 Comm: syz-executor.4 Not tainted 5.1.0-rc4+ #59 [ 232.064259][T12629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 232.074334][T12629] Call Trace: [ 232.077684][T12629] dump_stack+0x172/0x1f0 [ 232.082054][T12629] should_fail.cold+0xa/0x15 [ 232.086674][T12629] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 232.092521][T12629] ? ___might_sleep+0x163/0x280 [ 232.097403][T12629] __should_failslab+0x121/0x190 [ 232.102373][T12629] should_failslab+0x9/0x14 [ 232.106903][T12629] kmem_cache_alloc+0x2b2/0x6f0 [ 232.111782][T12629] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 232.117623][T12629] ? lock_downgrade+0x880/0x880 [ 232.122857][T12629] skb_clone+0x150/0x3b0 [ 232.127135][T12629] netlink_broadcast_filtered+0x870/0xb20 [ 232.132899][T12629] netlink_broadcast+0x3a/0x50 [ 232.137739][T12629] kobject_uevent_env+0xa94/0x1030 [ 232.142980][T12629] kobject_uevent+0x20/0x26 [ 232.147510][T12629] __loop_clr_fd+0x4ee/0xd60 [ 232.152131][T12629] lo_ioctl+0x210/0x2150 [ 232.156408][T12629] ? tomoyo_domain+0xc5/0x160 [ 232.161149][T12629] ? lo_rw_aio+0x1120/0x1120 [ 232.165774][T12629] blkdev_ioctl+0x6f2/0x1d10 [ 232.170393][T12629] ? blkpg_ioctl+0xa90/0xa90 [ 232.175013][T12629] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 232.180856][T12629] ? __fget+0x35a/0x550 [ 232.185140][T12629] block_ioctl+0xee/0x130 [ 232.189497][T12629] ? blkdev_fallocate+0x410/0x410 [ 232.194554][T12629] do_vfs_ioctl+0xd6e/0x1390 [ 232.199210][T12629] ? ioctl_preallocate+0x210/0x210 [ 232.204351][T12629] ? __fget+0x381/0x550 [ 232.208565][T12629] ? ksys_dup3+0x3e0/0x3e0 [ 232.213010][T12629] ? kfree+0x173/0x230 [ 232.217106][T12629] ? kfree+0x173/0x230 [ 232.221213][T12629] ? tomoyo_file_ioctl+0x23/0x30 [ 232.226177][T12629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 232.232483][T12629] ? security_file_ioctl+0x93/0xc0 [ 232.237628][T12629] ksys_ioctl+0xab/0xd0 [ 232.241818][T12629] __x64_sys_ioctl+0x73/0xb0 [ 232.246439][T12629] do_syscall_64+0x103/0x610 [ 232.251063][T12629] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 232.256994][T12629] RIP: 0033:0x458167 [ 232.260909][T12629] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 0d ba fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 232.280534][T12629] RSP: 002b:00007fb8aede9a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 232.288962][T12629] RAX: ffffffffffffffda RBX: 00007fb8aede9b40 RCX: 0000000000458167 [ 232.296952][T12629] RDX: 0000000000000000 RSI: 0000000000004c01 RDI: 0000000000000005 [ 232.304948][T12629] RBP: 0000000000000000 R08: 00007fb8aede9b40 R09: 00007fb8aede9ae0 [ 232.312934][T12629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 232.320930][T12629] R13: 00000000004c6c59 R14: 00000000004dc630 R15: 0000000000000003 22:14:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000000000)="a8740fb4b421ffaffbf97de8e1ce995f57ba57fb95e6bf8092427c60d307e4d0d6f19e43ff68cf1c65851bdd2605fca6d3b466", 0x33, 0xfcfaf4fa667d739, &(0x7f0000000040)={0xa, 0x4e24, 0x8, @dev={0xfe, 0x80, [], 0x24}}, 0x1c) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:23 executing program 4 (fault-call:0 fault-nth:99): syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 232.417850][T12641] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:23 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:23 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000000)) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) [ 232.555742][T12641] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x83b5, 0x1) bind$unix(r1, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e20}, 0xfffffffffffffda4) 22:14:23 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:23 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:23 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:23 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:23 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x2, 0x400) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080)=0x7, 0x4) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x59, 0x8001) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:23 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x2080) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0xfffffffffffffff5, 0x2, {0x6}}, 0x18) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f00000000c0)=""/173) 22:14:23 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000300)=@nat={'nat\x00', 0x1b, 0x5, 0x820, 0x368, 0x230, 0x508, 0x0, 0x230, 0x750, 0x750, 0x750, 0x750, 0x750, 0x5, &(0x7f0000000040), {[{{@uncond, 0x0, 0x1e8, 0x230, 0x0, {}, [@common=@inet=@recent0={0xf8, 'recent\x00', 0x0, {0x1, 0x6, 0x1, 0x0, 'syz0\x00', 0x101}}, @common=@mh={0x28, 'mh\x00', 0x0, {0xd4f0, 0x3, 0x1}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x8, @ipv6=@mcast1, @ipv6=@mcast2, @gre_key=0xff800, @port=0x4e21}}}, {{@uncond, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x20, 0x8}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x9, @ipv4=@loopback, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @icmp_id=0x66, @icmp_id=0x66}}}, {{@uncond, 0x0, 0x158, 0x1a0, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0x4, 0x3, 0x1, [0x0, 0x9, 0x1, 0x8, 0xffffffffffffff81, 0x100000001, 0x9, 0x7f4, 0x1000, 0x2, 0x100000001, 0x0, 0x2, 0x100, 0x3f, 0x7], 0xe}}, @common=@dst={0x48, 'dst\x00', 0x0, {0x7, 0x6, 0x0, [0x7fffffff, 0x3, 0x11, 0x9, 0x6, 0xe8, 0x0, 0x2ba, 0x20, 0x6, 0x1, 0x0, 0x5, 0x7, 0x8001, 0x9], 0x3}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x8, @ipv6=@ipv4={[], [], @remote}, @ipv4=@rand_addr=0x3, @icmp_id=0x65, @gre_key=0xffffffff}}}, {{@uncond, 0x0, 0x120, 0x248, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0x7f, 0x6, 0x7ff, 0x2, 0x40, 0x0, 0x40}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x2, 0x6}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:cpu_online_t:s0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x880) 22:14:23 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:23 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='n%fs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:23 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:23 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x1800000000000000, 0x28001) write$evdev(r0, &(0x7f0000000280), 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0xeb, "7cad0be3094751970d4bfec8ac28dde73df1c01bfb6dcfe033ab403056089267e8b087011f889cedadb72692967c77f7ed6a6b977bdb909da0f593a646864561848a93e8f3ef69d068a7f4e213ae74318d942439503b8a6553bd944701cb2248868ac9b7321a61e8732e1858b4eba0c152db412995aee420e5a646d0ad7d1ac48ab3fda262defa0ad47d8fef07ad70178102a8568e5ffb2f9580900febe1ca7074c15ded55c55d50d3b29ff632afd07084fec98f25cd545566796660c0746cf5ab1b15f1722e91c50fc39bdad4b6b8b8b211b13934ba76c0a01142bfac32a0bb313d4857e13530e7421956"}, &(0x7f0000000040)=0xf3) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000000c0)={r3, 0x4}, 0x8) timerfd_gettime(r2, &(0x7f0000000100)) 22:14:24 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:24 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) fcntl$getown(r0, 0x9) 22:14:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20000, 0x80000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x18081, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000180)=0x8, 0x4) r2 = getpid() ioctl$TCSETSF(r1, 0x5404, &(0x7f00000001c0)={0xcf, 0x2, 0x5, 0xffffffffffffd191, 0xd, 0x100, 0x5, 0x7, 0x0, 0x1, 0x5, 0x74}) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x8, 0x0, 0x5, 0xfffffffffffffffe, 0x0, 0x3, 0x2, 0x0, 0x40, 0x2, 0x6, 0x8, 0x2, 0x9e0d, 0x4, 0xffffffffffff7fff, 0x59, 0xffffffff, 0x4, 0x3, 0xffffffff, 0x3eb5, 0x4, 0x1, 0xffff, 0x6, 0xaf, 0x7ff, 0x9, 0x3, 0xc2, 0x2, 0x401, 0x5, 0xffffffffffffffe0, 0x9, 0x0, 0x80000001, 0x0, @perf_bp={&(0x7f00000000c0), 0x6}, 0x1, 0x6ee0000000000000, 0x2, 0x6, 0x7, 0x3, 0x200}, r2, 0x5, r1, 0x8) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000080)={0xffffffff80000001, 0x100, 0xf88, 0x3, 0x12, 0x101, 0x2, 0x9, 0x1ff, 0xc18, 0xffffffff00000000, 0x7ff}) write$evdev(r0, &(0x7f0000000280), 0x0) 22:14:24 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:24 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x85) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:24 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:24 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:24 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='nt.s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:24 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) fchdir(r0) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x800) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r3 = fcntl$getown(r2, 0x9) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x5, 0x8000, 0x80, 0x75cc, 0x0, 0x800, 0x2000, 0x9, 0x9, 0x100, 0x7, 0x163, 0x5, 0x9, 0x1, 0xffffffffffffffc1, 0x3, 0x5, 0x4, 0x8001, 0x2, 0x3, 0x4, 0x100000000, 0x2, 0x9, 0x4, 0x7, 0x2, 0x5, 0x8001, 0x100000001, 0xfff, 0x7ff, 0x3, 0xfffffffffffffffc, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x80, 0x1, 0x0, 0x6, 0x5f2, 0x144000000, 0x3}, r3, 0x10, r2, 0x1) 22:14:24 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:24 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x627, 0x8001) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x1000, 0x0) r2 = accept(r1, &(0x7f0000000100)=@alg, &(0x7f0000000180)=0x80) getpeername$llc(r1, &(0x7f0000000080)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00000000c0)=0x10) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) setsockopt$rose(r2, 0x104, 0x7, &(0x7f00000001c0)=0xffffffffffffff80, 0x4) 22:14:24 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:24 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vcsa(&(0x7f0000000180)='/dev/vcsa#\x00', 0x4, 0x7b4bfea5cf6bc7ef) syncfs(r0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x20000) sendto$llc(r2, &(0x7f0000000040)="338be879685b9901ecb1538eb48e6c6f9ed9c4e714621f4649fdf8583d32a8f4267ebd0715075525f3c903c15a86acc3faaec4e8a19a4f44a903424ad402c21f3685828de8123461acc52a6d0c09a73b0ac9056b5ce432012e328a7a98b3403c699ca8b85295b5dc241954053c6c7a3b0550bae53cd84c2b7d990ca93082a777e66905444882a70d6e3d4f8eed98aeab8045affbba8adc9407db857af290c21d860534f72c8119a1efb56c8faaafb5843d8574e2062bdc853f9cf6f2ba3b8a182da62d17954b6c522380cefc07d89f1d88e41964ca99fb0a72427429ee53cb593db6cab7f0c6669d5c2a33c544f1e86236b8b9439b0f", 0xf6, 0x4008800, &(0x7f0000000140)={0x1a, 0x4, 0x4, 0x8, 0x7, 0x9, @remote}, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x1c, r3, 0x600, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x44) 22:14:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8000, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:24 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\x02'}) 22:14:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:24 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='nt/s\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:24 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\x03'}) 22:14:24 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000000)=""/131) 22:14:25 executing program 2: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x800, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000100)={r0}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x4, 0x80000001, 0x7e290640, 0x8, 0x7, 0x8, 0x2, 0x1}}) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000140)={0x9, {0x1, 0xfffffffffffffe00, 0x1e, 0x9, 0x9, 0x7fff80000}}) write$evdev(r0, &(0x7f0000000280), 0x32d) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000180)={r0}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x6c, r2, 0x10, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_NET={0x58, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4864}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x10000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x80000001}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20040800}, 0x800) 22:14:25 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\x04'}) 22:14:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:25 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:25 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xf9', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:25 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\x05'}) 22:14:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntf#\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:25 executing program 2: r0 = getpgid(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x200000, 0x0) recvfrom(r1, &(0x7f0000000100)=""/210, 0xd2, 0x12000, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3, 0x4, 0x1}}, 0x80) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x80182, 0x0) write$rfkill(r3, &(0x7f0000000000)={0x0, 0x0, 0x3}, 0x8) sched_getscheduler(r0) r4 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r4, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$evdev(r4, &(0x7f0000000080)=[{{r5, r6/1000+30000}, 0x11, 0xffffffffffffff80, 0x9}, {{0x77359400}, 0x3, 0x7f, 0x1b8d}, {{r7, r8/1000+10000}, 0x14, 0x2, 0xfffffffffffffffd}], 0x48) ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f0000000240)=0x200) 22:14:25 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\x06'}) 22:14:25 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:25 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00\x00\x00\x00\x00\a'}) 22:14:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:25 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xfc', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x40) ioctl$DRM_IOCTL_DROP_MASTER(r1, 0x641f) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:25 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:25 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2200, 0x0) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000100)=ANY=[@ANYBLOB="03000000000000008b03000000000000ea4e00000000000001040000000000060000000000000083020000000000001e0c0000000000005aa2d9909b21c334f70509507b146abd6f19fcb3dc0d24ce58baf9600bd005e9768ca44605b77c15e10c"]) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @hyper}, 0x10) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:25 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntf%\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x8002, 0x27fff) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x400, 0x140) syz_open_pts(r1, 0x2800) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:26 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x100002, 0x2) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:26 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xfd', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000040)=[{{0x0, 0x2710}, 0x3, 0x1, 0xfffffffffffffffa}, {{}, 0x1f, 0x8, 0x4}, {{0x0, 0x7530}, 0x15, 0x0, 0x3}, {{r1, r2/1000+10000}, 0x0, 0x9, 0xffff}, {{}, 0x17, 0x4, 0x7}, {{0x0, 0x2710}, 0x14, 0x2, 0x71d}, {{0x0, 0x7530}, 0x5, 0xfffffffffffffff9, 0x9}], 0xa8) 22:14:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntf*\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:26 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)=0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x0, 0x0) ioctl$KVM_IRQ_LINE(r2, 0x4008ae61, &(0x7f0000000240)={0x0, 0x1}) pipe(&(0x7f0000000180)={0xffffffffffffffff}) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, r0, &(0x7f00000001c0)={r3, r0, 0xfff00000}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000000)=""/9) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000040)=""/243) 22:14:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:26 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:26 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:26 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x7f', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:26 executing program 2: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x600101, 0x0) write$rfkill(r0, &(0x7f0000000040)={0x0, 0x1, 0x3, 0x1}, 0x8) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x80, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) [ 235.680593][T12912] __ntfs_error: 17 callbacks suppressed [ 235.680605][T12912] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:26 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:26 executing program 2: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000040)={0x800, 0xfffffffffffffffc, 0x80000000, 0x1}) 22:14:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntf+\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x10000000002, 0x200000028001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x5, 0x301040) ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000080)={0x100000001, 0x20, 0x10001, 0x2}) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f00000000c0)={0x1ff, 0xb2, 0x8, 0x7, 0x7fffffff, 0x8}) 22:14:26 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x296) 22:14:26 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x8c', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 236.057072][T12950] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:27 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PPPIOCSFLAGS(r1, 0x40047459, &(0x7f0000000040)) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xcd, 0x0) 22:14:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x101000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000140)={'filter\x00'}, &(0x7f0000000040)=0x54) mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f00000001c0)=""/84) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x40000001000, 0x2c0) 22:14:27 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 236.321650][T12950] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x81, 0x101400) 22:14:27 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntf-\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:27 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:27 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x97', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) 22:14:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000040)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f0000000180)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:27 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 236.705348][T13002] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:27 executing program 2: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x311800, 0x0) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000040)={0x18, 0x1, 0x0, {0x200}}, 0x18) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0xffffffffffffffff, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntf.\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 236.902940][T13008] FAT-fs (loop1): bogus number of reserved sectors [ 236.924113][T13008] FAT-fs (loop1): Can't find a valid FAT filesystem [ 236.924409][T13002] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x1, 0x200) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:27 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xf6', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:27 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x24000) connect$netlink(r1, &(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfc, 0x400000}, 0xc) [ 237.250264][T13008] FAT-fs (loop1): bogus number of reserved sectors [ 237.274465][T13008] FAT-fs (loop1): Can't find a valid FAT filesystem 22:14:28 executing program 1: r0 = shmget$private(0x0, 0x400000, 0x7ff, &(0x7f0000bff000/0x400000)=nil) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x800, 0x10200) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000300)=[{{0x77359400}, 0x3, 0x1, 0x8}, {{r2, r3/1000+30000}, 0x11, 0x5, 0x8}], 0x30) shmctl$SHM_LOCK(r0, 0xb) r4 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x301000) getsockopt$inet_int(r1, 0x0, 0xc, &(0x7f0000000440), &(0x7f0000000480)=0x4) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x6, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r4, &(0x7f0000000140)=[{{0x77359400}, 0x0, 0xffff, 0x4}, {{}, 0x5, 0xb46, 0x6}, {{}, 0x17, 0x3cb, 0x7}, {{0x0, 0x7530}, 0x5, 0x380000000000000, 0x4}, {{r5, r6/1000+10000}, 0x1f, 0x2, 0x100}, {{0x0, 0x7530}, 0x12, 0x8, 0x7}, {{r7, r8/1000+30000}, 0x1f, 0x1ff, 0x7}, {{0x0, 0x7530}, 0x1f, 0x40, 0x16}], 0xc0) write$evdev(r4, &(0x7f0000000280)=[{{}, 0x14}], 0x83) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000400)="b51cb547916a2fff592cead240b82a5f", 0x10) ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f0000000080)=0x7) prctl$PR_GET_DUMPABLE(0x3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000340)={0x6, 0x400, 0x911, 'queue0\x00', 0x7af}) r9 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x1) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r9, 0x84, 0x7, &(0x7f0000000040)={0x4}, 0x4) 22:14:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntf0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:28 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x100, 0x200) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="80c307005e090800050035000000ff0301b4"], &(0x7f0000000100)=0x16) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={r2, 0x40, 0x7, [0x3, 0x7ff8000, 0x1, 0x3, 0x2, 0x1, 0x4]}, &(0x7f0000000180)=0x16) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) [ 237.431120][T13046] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:28 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000040)={0x800, "f0f5b9974d3736a684c8533ef0f8f6e120368501e19021e113defb4b8d7b2541", 0x1, 0x4, 0x1, 0x20, 0x4000400, 0x2}) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:28 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xfd', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 237.567608][T13046] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:28 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$admmidi(&(0x7f0000000240)='/dev/admmidi#\x00', 0x2, 0x10002) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000300)={0x0, 0x64, "51d2ed39464b21eb257f46465d167d995090c44cb51a49608bdcd56b772d2a195d612b3caca96100948d88a8705e8e0690205cfe65f9e683fc4c4fadbf085b5c5a2df6507cc621cb27b95d9188ce6df854c3dfbaf29f5caed16fea843e84619115278a1e"}, &(0x7f0000000380)=0x6c) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000003c0)={0x0, 0x8000, 0x3, 0x3, r2}, &(0x7f0000000400)=0x10) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x18, &(0x7f0000000000)='eth1mime_type$selinux){\x00'}, 0x30) ptrace$setopts(0x4206, r3, 0x80, 0x100004) r5 = socket$inet6_udp(0xa, 0x2, 0x0) recvfrom$inet6(r5, &(0x7f0000000080)=""/120, 0x78, 0x121, &(0x7f0000000100)={0xa, 0x4e24, 0x0, @mcast2, 0x3ff}, 0x1c) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x80, 0x0) write$ppp(r6, &(0x7f00000001c0)="9da99399f2aa93888664076469672becafd77e6c1905da04c52aae2c89e636a53246959e36c3ee9769b2bfe5d9fba68efbea47cf41edd952683a43a8197293169e5a0ae0af683560c49498cc24a7", 0x4e) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r8 = dup3(r4, r7, 0x80000) ioctl$TIOCGPGRP(r8, 0x540f, &(0x7f0000000140)) 22:14:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) clock_gettime(0x2, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f00000000c0)=[{{r1, r2/1000+10000}, 0x3, 0x3ff}], 0x18) pwrite64(r0, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfX\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:28 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 237.835589][T13083] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x40, 0x80) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:28 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:28 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 238.013516][T13083] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RLCREATE(r1, &(0x7f0000000040)={0x18, 0xf, 0x2, {{0x26, 0x1, 0x6}, 0xfffffffffffffffe}}, 0x163) 22:14:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfc\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 238.195372][T13106] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:29 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/audio\x00', 0x20080, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ubi_ctrl\x00', 0x200002, 0x0) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000700)={0x0, 0x6}) write$evdev(r1, &(0x7f0000000280), 0xffffffffffffff45) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000005c0), &(0x7f0000000600)=0x4) getsockopt$inet_mreqn(r0, 0x0, 0x7f8bf1f75dc2669a, &(0x7f0000000680)={@multicast2, @loopback, 0x0}, &(0x7f00000006c0)=0xc) sendmsg$xdp(r1, &(0x7f0000002b40)={&(0x7f0000000740)={0x2c, 0x1, r2, 0x2e}, 0x10, &(0x7f0000002ac0)=[{&(0x7f0000000780)="2742798f5b2b637d52cbfd67b352575a9927328119bc52cca52a932a1c01ab2430ab69ee128abe7f7fa6dce450c107a2051cf52ab9d2b7ffbf94bb63ed5ea24a80bf97487a3ee8bf57d2481dcca32bbfde1848ecaedc9b457fed62e9a167b3a7451f3db4d6ad8daec565", 0x6a}, {&(0x7f0000000800)="ceda6a7adeceef56286f48920280010d34d57230ab32ab621b7f513570093242a9", 0x21}, {&(0x7f0000000840)="dfb84bce0267cf552f5494b9372fd504a19564cfcde5a4ed993a943ee51139a9a839ca16a79695b5ebdad7aa30f248ad4a5637baf85e270581cf02bdfa6361d8a8f41d21a5b2135f3ccd215174332bdacff58f7e13425764f078f72eb7294587ee09aadbebadd90ffecf17db89f62547bb06058407d52a343805173d50faad54d4fa740f078a69aef68263ae68ae9ad91b09c525aed191bd413a723d4458ffa896fe37f3d0381f2840bf19ee75ccafd1c11ec5aabdfbb407d46dbe6878f88613b23da6fe36f2", 0xc6}, {&(0x7f0000000940)="4cd835d51d9427fa1eb3e8b31ba51080eb0aa1610a5786e192c75c8ae82ff77943da83dcae0b2f74c4e591f3c432f275f2106e828f0ab86d1cd3d2c6573d93f0b2dd6d6e4a4350c8c555e15b1b61196db45de4ca0d5054797689956b38d4a7fa0af0ee2ad6d7cb173cddd3f82d6d93886bf3ed965a0eed554f6c53ad50e2a4d20f0cad4e7163bca14784250ed016ec0a9a7f51", 0x93}, {&(0x7f0000000a00)="4113d6ed", 0x4}, {&(0x7f0000000a40)="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", 0x1000}, {&(0x7f0000001a40)="8eb06d42c379f6ce0b5d762a1126694eb2090558e6fcfabf33078b294bfe485a2999d2548b173a03f1de63384a6b9f47d7a015915ac7627322234a6c72a0e96213530b321fa2709754859cf4f3f33e92711ddb5402c3c6485175f069cfaba0fc", 0x60}, {&(0x7f0000001ac0)="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", 0x1000}], 0x8, 0x0, 0x0, 0x800}, 0x4008000) arch_prctl$ARCH_GET_CPUID(0x1011) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80000000040, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000000040)={{0x7, 0x5, 0x1, 0x274, 'syz1\x00', 0x8000}, 0x1, [0x5, 0x7fff, 0xd90, 0x80000000, 0xc671, 0x9445, 0x80000001, 0x2, 0x9, 0xbd, 0x10001, 0x68, 0x7, 0x4, 0xffffffff80000001, 0x3, 0x6, 0x5, 0x200, 0x6, 0x4, 0x6, 0x5, 0x6, 0x1, 0xff, 0x9, 0xea2f, 0x6, 0x80000000, 0x8, 0x32, 0x6, 0x1, 0x100000001, 0xdb0, 0x6, 0x9, 0x7, 0x48d, 0x6, 0x1, 0x4, 0x7, 0x9df, 0x1, 0x5, 0x3, 0x5af6, 0x6, 0x7ff, 0x6, 0xec5, 0xfffffffffffffff9, 0x1bb186ea, 0x1, 0x400, 0x81, 0x7, 0x3, 0x8, 0x95f, 0xa0, 0xf800000000000000, 0x9, 0x1000, 0x0, 0xfffffffffffffe00, 0x3f, 0x8001, 0xe39, 0xfffffffffffffffe, 0x4, 0x8, 0xfffffffffffff000, 0x9, 0x2, 0x2, 0x4b8, 0x5b7fed56, 0x4, 0xfffffffffffffffc, 0xaf, 0x3, 0x9, 0x5, 0x9, 0x80000001, 0x9, 0x100000000, 0x9, 0x8, 0x1000, 0x7, 0x6, 0x3, 0x1ff, 0x2, 0x6, 0x9, 0x1, 0x7c, 0x1, 0x10001, 0x48000000000, 0x6, 0xfffffffffffffff7, 0x1000, 0x7, 0x3, 0x10000, 0x1a58, 0x6, 0x120000, 0x7, 0x2, 0x9, 0x100000001, 0x6, 0x5602, 0xfffffffffffffff7, 0x1000, 0xffffffff, 0x3, 0x4, 0xb5, 0x10000, 0x9]}) syz_genetlink_get_family_id$fou(&(0x7f0000000640)='fou\x00') 22:14:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x7, 0x27fff) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:29 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:29 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:29 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/netstat\x00') ioctl$BLKRAGET(r1, 0x1263, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) fadvise64(r1, 0x0, 0x8, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{r2, r3/1000+10000}, 0x14}], 0x18) 22:14:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfd\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:29 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:29 executing program 1: r0 = getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000240)=0x0) r2 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/attr/exec\x00', 0x2, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000300)='/dev/vcs#\x00', 0x0, 0x14402) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x4b0040, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000380)={r3, r4, 0x4}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) r6 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$BLKTRACESTART(r6, 0x1274, 0x0) write$evdev(r5, &(0x7f0000000280)=[{{}, 0x14}], 0x83) write$evdev(r5, &(0x7f0000000040)=[{{0x0, 0x2710}, 0x3, 0xd237, 0xffffffffffffffe0}, {{0x0, 0x7530}, 0x15, 0x5, 0x9a}, {{0x77359400}, 0x5, 0x3f, 0x8}, {{0x77359400}, 0x17, 0x1d0, 0x7}, {{0x77359400}, 0x17, 0xff, 0x9}, {{0x77359400}, 0x0, 0xff, 0x3}], 0x90) write$UHID_INPUT2(r6, &(0x7f0000000180)={0xc, 0xb8, "686b75a8c12a449088b1c1341d7585f8f79e3f35fe9ee19b008e448de677ed1edaf030e6ea3d0c2b8bcbc897f073f8f7da3302a40756cbb79863e04c6084bf82ebbe0db3ff11437ea9cc17add595350b18ee280f608e0b833275cb0c7701f7b4c620b52189822f5d071ef7c116f2153f77a6d955e48b994c5cdcf02513a831da7ca632c2bbe6d1693c6f268266b45e3dfa2cae2cc6d2df4855ab43abf4e3157d0ded9160ae1246ee57ce90c909d6f6b0cdd75ff56b79565e"}, 0xbe) setsockopt$inet6_tcp_TLS_RX(r6, 0x6, 0x2, &(0x7f0000000140), 0x4) 22:14:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) socket$inet_smc(0x2b, 0x1, 0x0) 22:14:29 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfi\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080), 0x0, 0xfffffffffffffffc) keyctl$read(0xb, r1, &(0x7f00000000c0)=""/68, 0x44) 22:14:29 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:30 executing program 1: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x700, 0x0) ioctl$BLKFRASET(r0, 0x1264, &(0x7f0000000040)=0xdd0) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:30 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000000)=[{{}, 0x5, 0x7c5}], 0x1) 22:14:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x6, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) clock_adjtime(0x5, &(0x7f0000000000)={0x3, 0x26c0000000000, 0x3, 0x100, 0x5, 0x5, 0x10001, 0x6a, 0x7, 0x7, 0x6, 0x3ff, 0x8000, 0xfff, 0x3, 0xbdf, 0xfffffffffffffffc, 0x7, 0xff1f, 0x5500, 0x101, 0x1, 0x9, 0x2, 0x4, 0x3}) 22:14:30 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2000000000000002, 0x28004) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x45) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:30 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:30 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfl\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$int_in(r0, 0x5473, &(0x7f0000000000)=0xfff) 22:14:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x38001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:14:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x100c2, 0x0) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000040)="4dd6f03b38745b1b2e29ff3ff55bd3cb67a9ef6eec002fa696ab45a360f8221047871d8815d60a79af7409cfb31e3e0f5e57ad7c7fca708e0436bb4fe515025047017aababe71a9b136f7d7fa83474189e006f9630679138566383a9dcf5da0713b18c8f76a0c5b4b6d8af69b1e283470f3a679c0e9802e83c28f30d981a7f09c2a4ad8740f0f8e2bfdf1b15efd88f715df0d2d7009d2fe4a8614e588e54d1") write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000100)={0x2b, 0x4, 0x0, {0x3, 0x23c0, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) 22:14:30 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) fcntl$getownex(r0, 0x10, &(0x7f0000000640)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @initdev}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000780)=0xe8) r7 = getgid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000007c0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) getgroups(0x1, &(0x7f0000000940)=[0xee01]) r11 = fcntl$getown(r1, 0x9) getresuid(&(0x7f0000000980), &(0x7f00000009c0)=0x0, &(0x7f0000000a00)) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000e80)={0x100, 0x3, 0x2}) getresgid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)=0x0) sendmsg$unix(r1, &(0x7f0000000c40)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000100)="098c3aae9cd44384621ca11c45906394afadea3492969f1b0170ba96d98d9d0a04ebf8e09b2702bc9eaa97a71d32ad93278f3676550f2b7ae3827b6adb55c8b68e1e8e4070513adecafab96f1f0fc3b147a6c9027737e764af945b7c3c925bdd119aad3afaa31e766f27efe483a90fe0f6827ba07a2bc1b630771e44b4a6bc438bed82a5369a1515ce245e0a1d69be292e6541f9e336dc56e878656a565b163832c8e5f03fcd26503ca523ccf09eed79c08232dace7d116b744bd3a66369232b0f39bd0f35e2e25b72bae6851dffebb9190e045725bd7c45081a4ec60c06b145c6000c8e82fab62572c2cc738957", 0xee}, {&(0x7f0000000300)="c68681e156ed8de75266766a5b11c4469f0b31765e2b7e83a7161cdab84e214567ec0747d2dc69428c7b25c46e24552d49fefb12c634060d857f57aa4c0b36c9f00abe67aba82c539de661e14fcd99d31ca0ab6d24482ed741a6d2d8f3a43d7508cf675f9d7627e010e92874cabac74fbe764211c6fb9c109e1cb8bb382220c17422b9ed5715d504ac3bf9b1", 0x8c}, {&(0x7f0000000200)="cb003bd6167200039bf98b7e4503815e50234854ae997d3321c61c0a44a99d74cb7b068feb6bdfb849f93f4f0309281f5dbb0154f140b754", 0x38}], 0x3, &(0x7f0000000b00)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x30, 0x1, 0x1, [r1, r1, r1, r0, r1, r1, r1, r0]}, @rights={0x28, 0x1, 0x1, [r1, r1, r1, r0, r1, r1]}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @rights={0x28, 0x1, 0x1, [r0, r1, r0, r0, r1]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x10}], 0x128, 0x8000}, 0x40) 22:14:30 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:30 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4, 0x40901) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x18) clock_gettime(0x0, &(0x7f0000000040)) ioctl$KVM_SET_VCPU_EVENTS(r0, 0x4040aea0, &(0x7f0000000000)={0xffff, 0x3, 0x2, 0x0, 0x8e9, 0x0, 0x100000000, 0x4, 0x200, 0x510, 0x0, 0x1f, 0x0, 0x24000, 0x4e053605, 0x9, 0x0, 0x2, 0x1000}) 22:14:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000002}, 0x9, &(0x7f00000001c0)={&(0x7f0000000300)={0x2, r2, 0xa01, 0x70bd2d, 0x25dfdbff, {}, ["", ""]}, 0xffffffffffffffc3}, 0x1, 0x0, 0x0, 0x100024040080}, 0x20000000) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) shmget(0x2, 0x1000, 0xd2, &(0x7f0000ffc000/0x1000)=nil) 22:14:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:30 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfo\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:30 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:31 executing program 2: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x4, 0x36b, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]}, 0x3e3) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x7530}}], 0xfe72) 22:14:31 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x9f, 0x2000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000440)={0x0, 0x800, 0x7, 0x2, 0x10000, 0x3ff}, &(0x7f0000000480)=0x14) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000680)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000980)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000940)={&(0x7f00000006c0)={0x270, r3, 0x20, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8cd}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb29}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}]}, @TIPC_NLA_MEDIA={0xa8, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9a48}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xdc9a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}]}, @TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA={0xa0, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1400000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc0}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2e}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd4f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x270}, 0x1, 0x0, 0x0, 0x10}, 0x20004040) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000004c0)={r2, 0x25}, &(0x7f0000000500)=0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) r4 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xff, 0x20000) ioctl$KVM_ASSIGN_SET_MSIX_NR(r4, 0x4008ae73, &(0x7f0000000140)={0x3, 0x5}) set_tid_address(&(0x7f0000000540)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0xa8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000000c0)={r5, 0x2}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000580)=ANY=[@ANYBLOB="019f3d0072c811e77e73a7f80003000205222843e39b709f60c94590f9bdadfd3a88e7019cc57280a3194b0bdfc5500cbaf50c1acb6f2515b22da6782d7c2915c1599002da3d96a87702b3b595fdba0091f45933aff139d6a5d32c1488ab65f5e92ba972f8fe064ff5ebfe57693c35e26fe5cbd407944533d52a49dd6e3744c50bd3bbfba821a82afe99ff5ff15b8e22759a7e140f3326c079190fb5ca4ceb08beb4e1cfbba52a90438ce53103cb49a198201483885822", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000001c0)=0x28) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r4, 0x0, 0xd, &(0x7f0000000200)='/dev/usbmon#\x00'}, 0x30) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f00000009c0)=0xfffffffffffffffb) ptrace$getregs(0xe, r6, 0x4f55, &(0x7f0000000300)=""/242) ioctl$PPPOEIOCDFWD(r4, 0xb101, 0x0) 22:14:31 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:31 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:31 executing program 2: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x4, 0x36b, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000140], 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="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"]}, 0x3e3) r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x20, 0x101002) write$evdev(r0, &(0x7f0000000000)=[{{0x0, 0x7530}}], 0xfe72) 22:14:31 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfp\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:31 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xffffffffffffffff, 0x28001) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000080)=""/68, &(0x7f0000000100)=0x44) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000740)='/dev/hwrng\x00', 0x200880, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000007c0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x24000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x14, r2, 0x300, 0x70bd2a, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0xc4}, 0x20000000) r3 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x2, 0x20000) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x109000, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r3, 0xc0106407, &(0x7f00000008c0)={0xd3, 0x64d, 0x1, 0xd826}) setsockopt$EBT_SO_SET_ENTRIES(r4, 0x0, 0x80, &(0x7f00000001c0)=@nat={'nat\x00', 0x19, 0x4, 0x480, [0x200002c0, 0x0, 0x0, 0x200003e0, 0x20000638], 0x0, &(0x7f0000000180), &(0x7f00000002c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x1, [{{{0x1d, 0x40, 0x6eebbbca8d5a8391, 'bridge_slave_1\x00', 'team_slave_0\x00', 'veth1\x00', 'veth1_to_bridge\x00', @random="5fcf61983657", [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0x0, 0x0, 0xff, 0x0, 0x0, 0xff], 0x70, 0xc0, 0xf0}, [@common=@log={'log\x00', 0x28, {{0x7fffffff, "a56e455c48386bd2964644867ccd2f3c7f7fb28796e0cf9623338cabf412", 0x3}}}]}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x2}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2, [{{{0x5, 0x8, 0x201, 'vxcan1\x00', 'netdevsim0\x00', 'ip6erspan0\x00', '\x00', @remote, [0xff, 0xff, 0xff, 0xff], @broadcast, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], 0x70, 0xa8, 0xe0}, [@snat={'snat\x00', 0x10, {{@local, 0x10}}}]}, @arpreply={'arpreply\x00', 0x10, {{@link_local, 0xfffffffffffffffe}}}}, {{{0x0, 0x12, 0x4305, 'bond_slave_0\x00', 'bond_slave_1\x00', 'bond_slave_1\x00', 'rose0\x00', @broadcast, [0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff, 0xff, 0xff, 0xff], 0xd8, 0x110, 0x148, [@cgroup0={'cgroup\x00', 0x8, {{0x8, 0x1}}}, @mac={'mac\x00', 0x10}]}, [@arpreply={'arpreply\x00', 0x10, {{@local, 0xffffffffffffffff}}}]}, @arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x5, 0x8, 0x22f0, 'bridge0\x00', 'veth1_to_bond\x00', 'veth1_to_bond\x00', 'bond_slave_0\x00', @dev={[], 0x1d}, [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], @empty, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], 0x70, 0x70, 0xa8}}, @snat={'snat\x00', 0x10, {{@empty, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff}]}, 0x4f8) mbind(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x8000, &(0x7f0000000040)=0x4, 0x80000001, 0x1) 22:14:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:31 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000040)=0x100, 0x294) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1\x00', 0x0}) bind$packet(r1, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) sendto$inet6(r1, &(0x7f0000000200)="03830000030060000000", 0xa, 0x0, 0x0, 0x0) 22:14:31 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x400, 0x400242) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400040}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x30, r1, 0x100, 0x200, 0x25dfdbff, {{}, 0x0, 0x4101, 0x0, {0x14, 0x17, {0x3, 0xf3b1, @l2={'ib', 0x3a, 'ifb0\x00'}}}}, ["", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000440)={0x1}, 0x8) r2 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x8000000000000002, 0x8000000000202000) write$evdev(r2, &(0x7f0000000280)=[{{0x77359400}, 0x6, 0x500000000000000}], 0xfffffffffffffe6c) r3 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_SET_CPUID(r3, 0x4008ae8a, &(0x7f0000000040)={0x3, 0x0, [{0x1, 0x5, 0x1, 0x400, 0x8}, {0xc0000019, 0x8001, 0x8, 0xffffffff, 0xbad}, {0x80000019, 0x100000000, 0x4, 0x1, 0x5}]}) accept4$rose(r0, 0x0, &(0x7f0000000480), 0x800) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000140)=0x0) waitid(0x0, r4, &(0x7f0000000180), 0x2, &(0x7f00000002c0)) 22:14:31 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{0x0, 0x2710}, 0x14, 0x800}], 0x18) 22:14:31 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfu\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:31 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) [ 240.860872][T13314] __ntfs_error: 25 callbacks suppressed [ 240.860882][T13314] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) 22:14:31 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x1, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/238) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) [ 241.050648][T13314] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:32 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 22:14:32 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:32 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:32 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000040)=0x1, 0x2) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000080)={0x34, 0x3, 0x4, 0x6, 0xff, 0x81}) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 22:14:32 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfx\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 241.289941][T13344] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 241.302794][T13347] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:32 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) [ 241.348260][T13356] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 22:14:32 executing program 2: r0 = eventfd2(0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, 0x0) 22:14:32 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x8000, 0x8000) [ 241.460022][T13344] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:32 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) fcntl$getownex(r0, 0x10, &(0x7f0000000640)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @initdev}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000780)=0xe8) r7 = getgid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000007c0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) getgroups(0x1, &(0x7f0000000940)=[0xee01]) r11 = fcntl$getown(r1, 0x9) getresuid(&(0x7f0000000980), &(0x7f00000009c0)=0x0, &(0x7f0000000a00)) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000e80)={0x100, 0x3, 0x2}) getresgid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)=0x0) sendmsg$unix(r1, &(0x7f0000000c40)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000100)="098c3aae9cd44384621ca11c45906394afadea3492969f1b0170ba96d98d9d0a04ebf8e09b2702bc9eaa97a71d32ad93278f3676550f2b7ae3827b6adb55c8b68e1e8e4070513adecafab96f1f0fc3b147a6c9027737e764af945b7c3c925bdd119aad3afaa31e766f27efe483a90fe0f6827ba07a2bc1b630771e44b4a6bc438bed82a5369a1515ce245e0a1d69be292e6541f9e336dc56e878656a565b163832c8e5f03fcd26503ca523ccf09eed79c08232dace7d116b744bd3a66369232b0f39bd0f35e2e25b72bae6851dffebb9190e045725bd7c45081a4ec60c06b145c6000c8e82fab62572c2cc738957", 0xee}, {&(0x7f0000000300)="c68681e156ed8de75266766a5b11c4469f0b31765e2b7e83a7161cdab84e214567ec0747d2dc69428c7b25c46e24552d49fefb12c634060d857f57aa4c0b36c9f00abe67aba82c539de661e14fcd99d31ca0ab6d24482ed741a6d2d8f3a43d7508cf675f9d7627e010e92874cabac74fbe764211c6fb9c109e1cb8bb382220c17422b9ed5715d504ac3bf9b1", 0x8c}, {&(0x7f0000000200)="cb003bd6167200039bf98b7e4503815e50234854ae997d3321c61c0a44a99d74cb7b068feb6bdfb849f93f4f0309281f5dbb0154f140b754", 0x38}], 0x3, &(0x7f0000000b00)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x30, 0x1, 0x1, [r1, r1, r1, r0, r1, r1, r1, r0]}, @rights={0x28, 0x1, 0x1, [r1, r1, r1, r0, r1, r1]}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @rights={0x28, 0x1, 0x1, [r0, r1, r0, r0, r1]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x10}], 0x128, 0x8000}, 0x40) 22:14:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0x0, 0x0, 0x0, 0x0) 22:14:32 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) [ 241.590254][T13371] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x10000, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:32 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) fcntl$getownex(r0, 0x10, &(0x7f0000000640)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @initdev}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000780)=0xe8) r7 = getgid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000007c0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) getgroups(0x1, &(0x7f0000000940)=[0xee01]) r11 = fcntl$getown(r1, 0x9) getresuid(&(0x7f0000000980), &(0x7f00000009c0)=0x0, &(0x7f0000000a00)) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000e80)={0x100, 0x3, 0x2}) getresgid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)=0x0) sendmsg$unix(r1, &(0x7f0000000c40)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000100)="098c3aae9cd44384621ca11c45906394afadea3492969f1b0170ba96d98d9d0a04ebf8e09b2702bc9eaa97a71d32ad93278f3676550f2b7ae3827b6adb55c8b68e1e8e4070513adecafab96f1f0fc3b147a6c9027737e764af945b7c3c925bdd119aad3afaa31e766f27efe483a90fe0f6827ba07a2bc1b630771e44b4a6bc438bed82a5369a1515ce245e0a1d69be292e6541f9e336dc56e878656a565b163832c8e5f03fcd26503ca523ccf09eed79c08232dace7d116b744bd3a66369232b0f39bd0f35e2e25b72bae6851dffebb9190e045725bd7c45081a4ec60c06b145c6000c8e82fab62572c2cc738957", 0xee}, {&(0x7f0000000300)="c68681e156ed8de75266766a5b11c4469f0b31765e2b7e83a7161cdab84e214567ec0747d2dc69428c7b25c46e24552d49fefb12c634060d857f57aa4c0b36c9f00abe67aba82c539de661e14fcd99d31ca0ab6d24482ed741a6d2d8f3a43d7508cf675f9d7627e010e92874cabac74fbe764211c6fb9c109e1cb8bb382220c17422b9ed5715d504ac3bf9b1", 0x8c}, {&(0x7f0000000200)="cb003bd6167200039bf98b7e4503815e50234854ae997d3321c61c0a44a99d74cb7b068feb6bdfb849f93f4f0309281f5dbb0154f140b754", 0x38}], 0x3, &(0x7f0000000b00)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x30, 0x1, 0x1, [r1, r1, r1, r0, r1, r1, r1, r0]}, @rights={0x28, 0x1, 0x1, [r1, r1, r1, r0, r1, r1]}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @rights={0x28, 0x1, 0x1, [r0, r1, r0, r0, r1]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x10}], 0x128, 0x8000}, 0x40) 22:14:32 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x02', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:32 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:32 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) fcntl$getownex(r0, 0x10, &(0x7f0000000640)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @initdev}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000780)=0xe8) r7 = getgid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000007c0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) getgroups(0x1, &(0x7f0000000940)=[0xee01]) r11 = fcntl$getown(r1, 0x9) getresuid(&(0x7f0000000980), &(0x7f00000009c0)=0x0, &(0x7f0000000a00)) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000e80)={0x100, 0x3, 0x2}) getresgid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)=0x0) sendmsg$unix(r1, &(0x7f0000000c40)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000100)="098c3aae9cd44384621ca11c45906394afadea3492969f1b0170ba96d98d9d0a04ebf8e09b2702bc9eaa97a71d32ad93278f3676550f2b7ae3827b6adb55c8b68e1e8e4070513adecafab96f1f0fc3b147a6c9027737e764af945b7c3c925bdd119aad3afaa31e766f27efe483a90fe0f6827ba07a2bc1b630771e44b4a6bc438bed82a5369a1515ce245e0a1d69be292e6541f9e336dc56e878656a565b163832c8e5f03fcd26503ca523ccf09eed79c08232dace7d116b744bd3a66369232b0f39bd0f35e2e25b72bae6851dffebb9190e045725bd7c45081a4ec60c06b145c6000c8e82fab62572c2cc738957", 0xee}, {&(0x7f0000000300)="c68681e156ed8de75266766a5b11c4469f0b31765e2b7e83a7161cdab84e214567ec0747d2dc69428c7b25c46e24552d49fefb12c634060d857f57aa4c0b36c9f00abe67aba82c539de661e14fcd99d31ca0ab6d24482ed741a6d2d8f3a43d7508cf675f9d7627e010e92874cabac74fbe764211c6fb9c109e1cb8bb382220c17422b9ed5715d504ac3bf9b1", 0x8c}, {&(0x7f0000000200)="cb003bd6167200039bf98b7e4503815e50234854ae997d3321c61c0a44a99d74cb7b068feb6bdfb849f93f4f0309281f5dbb0154f140b754", 0x38}], 0x3, &(0x7f0000000b00)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @rights={0x30, 0x1, 0x1, [r1, r1, r1, r0, r1, r1, r1, r0]}, @rights={0x28, 0x1, 0x1, [r1, r1, r1, r0, r1, r1]}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @rights={0x28, 0x1, 0x1, [r0, r1, r0, r0, r1]}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @rights={0x10}], 0x128, 0x8000}, 0x40) 22:14:32 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x80) utimensat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x77359400}}, 0x100) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f00000001c0)) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x7530}, 0x16, 0x7fffffff, 0x8001}, {{}, 0x1, 0x9, 0xe900}, {{r2, r3/1000+30000}, 0x5, 0x4fed, 0x21f}, {{r4, r5/1000+30000}, 0x0, 0x4}], 0x60) [ 241.800844][T13385] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 241.817722][T13371] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:32 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:32 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) 22:14:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$cec(&(0x7f0000000280)='/dev/cec#\x00', 0x0, 0x2) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000300)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x80000000, 'syz1\x00', @default, 0x100000000, 0x2, [@default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) write$evdev(r0, &(0x7f0000000040)=[{{0x0, 0x2710}, 0x14, 0x200, 0x4}, {{0x77359400}, 0x12, 0x2, 0x8215}, {{0x0, 0x2710}, 0x5, 0x1, 0xc6}, {{}, 0x4, 0x200000000000, 0x5}, {{0x0, 0x2710}, 0x0, 0x0, 0xaed}], 0xfe86) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x24}, 0x100000000}, 0x1c) ioctl$UI_SET_MSCBIT(r2, 0x40045568, 0x1) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f00000000c0)={0x0, @reserved}) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000180)={0x1, 0x3}) ioctl$UI_SET_MSCBIT(r2, 0x40045568, 0x19) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000001c0)={{0x0, 0x1, 0x7, 0x3}}) 22:14:32 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) fcntl$getownex(r0, 0x10, &(0x7f0000000640)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @initdev}}}, {{@in=@remote}}}, &(0x7f0000000780)=0xe8) getgid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) getgroups(0x1, &(0x7f0000000940)=[0xee01]) fcntl$getown(r1, 0x9) getresuid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000e80)={0x100, 0x3, 0x2}) getresgid(&(0x7f0000000a40), &(0x7f0000000a80), &(0x7f0000000ac0)) [ 242.031221][T13409] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 242.038511][T13415] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:33 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x03', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:33 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x0, 0x0, 0x0, 0x0) 22:14:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) fcntl$getownex(r0, 0x10, &(0x7f0000000640)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @initdev}}}, {{@in=@remote}}}, &(0x7f0000000780)=0xe8) getgid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) getgroups(0x1, &(0x7f0000000940)=[0xee01]) fcntl$getown(r1, 0x9) getresuid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) ioctl$VIDIOC_S_FREQUENCY(r1, 0x402c5639, &(0x7f0000000e80)={0x100, 0x3, 0x2}) 22:14:33 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:33 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:33 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x400000) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) write$evdev(r0, &(0x7f0000000040), 0xa407) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x444000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r1, 0xc0086423, &(0x7f00000000c0)={r2, 0x1}) 22:14:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) fcntl$getownex(r0, 0x10, &(0x7f0000000640)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @initdev}}}, {{@in=@remote}}}, &(0x7f0000000780)=0xe8) getgid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) getgroups(0x1, &(0x7f0000000940)=[0xee01]) fcntl$getown(r1, 0x9) getresuid(&(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)) 22:14:33 executing program 1: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x40, 0x0) ptrace$pokeuser(0x6, r1, 0x8, 0xf33a) 22:14:33 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:33 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x04', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x0, 0x0) 22:14:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) fcntl$getownex(r0, 0x10, &(0x7f0000000640)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @initdev}}}, {{@in=@remote}}}, &(0x7f0000000780)=0xe8) getgid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) getgroups(0x1, &(0x7f0000000940)=[0xee01]) fcntl$getown(r1, 0x9) 22:14:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:33 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:33 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) fcntl$getownex(r0, 0x10, &(0x7f0000000640)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @initdev}}}, {{@in=@remote}}}, &(0x7f0000000780)=0xe8) getgid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) getgroups(0x1, &(0x7f0000000940)=[0xee01]) 22:14:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x0, 0x0, 0x0, 0x0) 22:14:33 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:33 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x05', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:33 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) fcntl$getownex(r0, 0x10, &(0x7f0000000640)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @initdev}}}, {{@in=@remote}}}, &(0x7f0000000780)=0xe8) getgid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) 22:14:33 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:33 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:34 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:34 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xa, 0x0, 0x0, 0x0, 0x0) 22:14:34 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) fcntl$getownex(r0, 0x10, &(0x7f0000000640)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @initdev}}}, {{@in=@remote}}}, &(0x7f0000000780)=0xe8) getgid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000007c0)) 22:14:34 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x06', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:34 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:34 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) fcntl$getownex(r0, 0x10, &(0x7f0000000640)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @initdev}}}, {{@in=@remote}}}, &(0x7f0000000780)=0xe8) getgid() 22:14:34 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:34 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:34 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xe, 0x0, 0x0, 0x0, 0x0) 22:14:34 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:34 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) fcntl$getownex(r0, 0x10, &(0x7f0000000640)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @initdev}}}, {{@in=@remote}}}, &(0x7f0000000780)=0xe8) 22:14:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\a', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:34 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:34 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) fcntl$getownex(r0, 0x10, &(0x7f0000000640)) 22:14:34 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:34 executing program 1: syz_mount_image$ntfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:34 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:34 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:34 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x10, 0x0, 0x0, 0x0, 0x0) 22:14:34 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:34 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:35 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\n', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:35 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:35 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x48, 0x0, 0x0, 0x0, 0x0) 22:14:35 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0xa, &(0x7f00000003c0)='/dev/vbi#\x00'}, 0x30) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in=@multicast2, @in=@broadcast}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000540)=0xe8) stat(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) fcntl$getownex(r0, 0x10, &(0x7f0000000640)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@ipv4={[], [], @initdev}}}, {{@in=@remote}}}, &(0x7f0000000780)=0xe8) getgid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000007c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000800)={{{@in=@loopback}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000900)=0xe8) getgroups(0x1, &(0x7f0000000940)=[0xee01]) 22:14:35 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000040), 0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:35 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, 0x0) 22:14:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) clock_gettime(0x2, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f00000000c0)=[{{r1, r2/1000+10000}, 0x3, 0x3ff}], 0x18) pwrite64(r0, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:35 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:35 executing program 2: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040), 0x8) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) clock_gettime(0x2, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f00000000c0)=[{{r1, r2/1000+10000}, 0x3, 0x3ff}], 0x18) pwrite64(r0, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x0e', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:35 executing program 2: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x1, 0x2) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:35 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) clock_gettime(0x2, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f00000000c0)=[{{r1, r2/1000+10000}, 0x3, 0x3ff}], 0x18) pwrite64(r0, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:35 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:35 executing program 2: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:35 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x68, 0x0, 0x0, 0x0, 0x0) 22:14:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) clock_gettime(0x2, &(0x7f0000000100)) pwrite64(r0, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:35 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:35 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x10', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:36 executing program 2: rt_sigaction(0x0, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:36 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) pwrite64(r0, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:36 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, 0x0) 22:14:36 executing program 2: rt_sigaction(0x0, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:36 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:36 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:36 executing program 2: rt_sigaction(0x0, &(0x7f0000000d00)={&(0x7f0000000c80)="8f2a581240e40000000098461292f6980000c4820105d942dce542f7753a0f2e29f3a436430f01d9c4027d78e8", {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:36 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:36 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x74, 0x0, 0x0, 0x0, 0x0) 22:14:36 executing program 2: rt_sigaction(0x32, 0x0, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfsH', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:36 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:36 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:36 executing program 2: rt_sigaction(0x32, 0x0, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:36 executing program 1: pwrite64(0xffffffffffffffff, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:36 executing program 2: rt_sigaction(0x32, 0x0, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:36 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:36 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, 0x0) 22:14:36 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) pwrite64(r0, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:36 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:36 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) [ 245.907735][T13725] __ntfs_error: 41 callbacks suppressed [ 245.907749][T13725] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 245.987267][T13733] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. 22:14:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfsL', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:36 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) pwrite64(r0, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:36 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:36 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:37 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 22:14:37 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) pwrite64(r0, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) [ 246.163300][T13748] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:37 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) pwrite64(r0, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:37 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {}, 0x0, 0x0}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:37 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) [ 246.300757][T13763] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 246.337450][T13763] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 22:14:37 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000e40)) 22:14:37 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 246.359653][T13763] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 22:14:37 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfsh', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:37 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:37 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) pwrite64(r0, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:37 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {}, 0x0, 0x0}, 0x0, 0x0, 0x0) 22:14:37 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) 22:14:37 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {}, 0x0, 0x0}, 0x0, 0x0, 0x0) [ 246.595940][T13779] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. 22:14:37 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:37 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:37 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {}, 0x0, 0x0}, 0x0, 0x0, 0x0) [ 246.755056][T13794] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. 22:14:37 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 246.812506][T13794] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 22:14:37 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:37 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfsl', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 246.862807][T13794] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 22:14:37 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00', 0x0}) 22:14:37 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:37 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 22:14:37 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x600, 0x0, 0x0, 0x0, 0x0) 22:14:37 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000000)="74b5a7b333e7d3f69a1b806635cb150bbfcd8dfdaa90ab343d48c0694d9b78340b0db1f1e57852cadc9fbd1857840182b8e70ee17bcf5d9c482a52c2aebd52eb5c030d872b870ad4378ad37645f58615c54488651eb48e13ca0ac049c640252a34ad16c3bf5cd70b41b1da5c3ce8be05e2f6850b75cdab3bc2f5efe61590d6278a9d56e5ba21853488191c087ccd38c1fef358c05ab1e364d2fdde20dd0619fd43583ec4b1", 0xa5, 0x0) 22:14:37 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0xf8c, 0x400400) read$rfkill(r2, &(0x7f00000002c0), 0x8) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f00000004c0)={0x1, @default, @bpq0='bpq0\x00', 0x6, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default]}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bridge_slave_1\x00'}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000380)={'rose0\x00', 0x10000004}) r3 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, 0x0, 0x2, 0x0) poll(0x0, 0xd6, 0x2) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x280200, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) fsetxattr$security_evm(r1, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="05010400000000010051fe4e36b17205b78cfb7792226ac3e49ced25ae4ebb735b0edca3a66a4e26d2ea24cbd7e2c7ea4d900400e3701f3f366d430ebcf8ff1d133f76ebb85619b24dc3c31a91ee9a7085698f6ef3aa6df5367805"], 0x5b, 0x3) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f00000003c0)='./bus\x00', 0xffffffffffffffff, 0x20000000000000) write$P9_RLOCK(r2, &(0x7f0000000300)={0x8, 0x35, 0x1, 0x1}, 0x8) ioctl$IMGETCOUNT(r5, 0x80044943, &(0x7f0000000480)) r6 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r7, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x2) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x3000002, 0x20010, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x2200, 0x0, 0xa0008000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r4, 0xc02c5341, &(0x7f0000000400)) write$RDMA_USER_CM_CMD_GET_EVENT(r7, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) ioctl$VIDIOC_G_AUDOUT(r7, 0x80345631, &(0x7f0000000040)) ioctl$KVM_SET_SREGS(r6, 0x4138ae84, &(0x7f0000000540)={{0x100001, 0x2000, 0xc, 0x3, 0x7, 0x6, 0x0, 0xfffffffffffffbff, 0x0, 0x3e, 0xfffffffffffffe01, 0x6}, {0x116000, 0x3000, 0xf, 0x1, 0x3, 0xdf, 0xffffffff, 0x7fffffff, 0x0, 0x1000, 0x6f1, 0x2}, {0x7000, 0x4000, 0xf, 0x9, 0x5, 0x101, 0xff, 0x100, 0x57f3, 0x3, 0x7, 0x7f}, {0x4000, 0x13000, 0x9, 0x1ff, 0x10001, 0x10001, 0x8000, 0x2, 0x3, 0x1f, 0x5, 0x1}, {0x2001, 0x3000, 0xf, 0x6, 0x7fffffff, 0xf8d, 0x4, 0x0, 0x17, 0x401, 0x5, 0x9}, {0x10000, 0x100002, 0x3, 0x1, 0x2, 0x9d5, 0x6, 0x294, 0x100000000, 0x514, 0x6, 0x1}, {0x3000, 0xf000, 0xf, 0x3, 0x3, 0x1, 0xff, 0x7d95, 0x0, 0x61c3, 0xf63, 0x3f}, {0x6000, 0xf006, 0xb, 0x8, 0x3, 0x0, 0x1ff, 0xc03, 0x7, 0xcfa0, 0x6}, {0xf000, 0xf000}, {0x5000, 0x3000}, 0x40000000, 0x0, 0x103d31d3670b6735, 0x4000, 0xd, 0x2800, 0x10000, [0x4e00000000, 0x100, 0x101, 0x1]}) umount2(&(0x7f0000000080)='./file0\x00', 0x1) socket$caif_seqpacket(0x25, 0x5, 0x4) 22:14:38 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:38 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 22:14:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) 22:14:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfst', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) 22:14:38 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bridge_slave_1\x00'}) getsockname(r0, &(0x7f0000001040)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f00000010c0)=0x80) 22:14:38 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:38 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x700, 0x0, 0x0, 0x0, 0x0) 22:14:38 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 22:14:38 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000080)={'security\x00', 0xda, "abd551a382c3baeeecda0f0c36a2eab94fdfc1c89d766d49d27a980d4744271c9608502475c55560173355260d6dd5fe7b370878bcb94ee02c7a438690ebbfa442ccb6e3d7ef747c0bf95c4876ccc99d8be336beb9210d061bb858f05ed06b9af7698e84806cb8c0fc7220cb6c53e1fae4c7abbf72f9cd9dba6ce8eb026201432a38a3904ce84607964cb3924d86abd82e8dd022cef0f834d4fbf1580901167995d6a5d1fe4e7b3b1c6e23fa6744d921b3d18312fcc41075c8ebe4845e0917d2d1effae675607d39f306098f31bbed38cf8257e5ab1a18448133"}, &(0x7f0000000180)=0xfe) 22:14:38 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) 22:14:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfsz', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:38 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:38 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, 0x0) 22:14:38 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:39 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f0000000140)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 22:14:39 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'ip6erspan0\x00\x00\x00\x00@\x00'}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r2 = fcntl$getown(r1, 0x9) capset(&(0x7f0000000040)={0x0, r2}, &(0x7f0000000080)={0x0, 0xfff, 0xb9, 0x0, 0x1, 0x8}) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000100)=0x3, 0x4) write$nbd(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="674466980100000001000200040010040014540f83845001ef4853d7667205a7c7ff2f41bf1745fa6e84c874f8b6b11abd7190d3ccf5c3e27096eb9df5993c3bc77604515b870f452f3fc6cfd8bd89b2b745cadd75a1862b7bfe00d6882150196b0db3ab4496a6cd531407e3749bc0912301f0205cb1ec57bb6d5b450dd48acae1d3f2c0d7bfe53fb91ec6804e83625f9000"/157], 0x12) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000340)={0x7, 0x2000000000000007, 0x40000000003, 'queue1\x00', 0xd54}) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000140)=""/50, &(0x7f0000000180)=0x32) ioctl$TIOCSBRK(r1, 0x5427) 22:14:39 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) 22:14:39 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x0, 0x1) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000000080)=""/4096) 22:14:39 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, 0x0) 22:14:39 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f0000000140)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 22:14:39 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:39 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) recvmmsg(r0, &(0x7f0000004a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/46, 0x2e}], 0x1, &(0x7f00000000c0)=""/197, 0xc5}}, {{&(0x7f00000001c0)=@hci, 0x80, &(0x7f0000000280)=[{&(0x7f0000000240)=""/57, 0x39}], 0x1, &(0x7f00000002c0)=""/34, 0x22}}, {{&(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000001380)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1, &(0x7f00000013c0)=""/184, 0xb8}, 0x2b}, {{&(0x7f0000001480)=@un=@abs, 0x80, &(0x7f0000004880)=[{&(0x7f0000001500)=""/18, 0x12}, {&(0x7f0000001540)=""/4096, 0x1000}, {&(0x7f0000002540)=""/92, 0x5c}, {&(0x7f00000025c0)=""/4096, 0x1000}, {&(0x7f00000035c0)=""/109, 0x6d}, {&(0x7f0000003640)=""/68, 0x44}, {&(0x7f00000036c0)=""/11, 0xb}, {&(0x7f0000003700)=""/178, 0xb2}, {&(0x7f00000037c0)=""/163, 0xa3}, {&(0x7f0000003880)=""/4096, 0x1000}], 0xa, &(0x7f0000004940)=""/195, 0xc3}, 0x4}], 0x4, 0x3, &(0x7f0000004b40)) 22:14:39 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:39 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f0000000140)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) 22:14:39 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f0000000140)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 22:14:39 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xf23, 0x0, 0x0, 0x0, 0x0) 22:14:39 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:39 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f0000000140)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) 22:14:39 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xc9', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:39 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', 0x0, 0x300, 0x0, 0x0, 0x0, 0x0) 22:14:40 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, 0x0) 22:14:40 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:40 executing program 1: syz_mount_image$ntfs(0x0, &(0x7f0000000140)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) 22:14:40 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0x1) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0x10, &(0x7f0000000180)={&(0x7f0000000100)={0x7, 0x420, 0x72, {}, {r1, r2/1000+10000}, {0x4, 0x8, 0x0, 0x4}, 0x1, @can={{0x3, 0x1e, 0x8, 0x8001}, 0x7, 0x3, 0x0, 0x0, "bcef407bed36f468"}}, 0x48}, 0x1, 0x0, 0x0, 0x40804}, 0x40) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000200)=""/242, &(0x7f0000000300)=0xf2) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:40 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', 0x0, 0x300, 0x0, 0x0, 0x0, 0x0) 22:14:40 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xca', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:40 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000040)={0x8, 0x9, 0x9, 'queue1\x00', 0x2}) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000140)=0x10001) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'syzkaller0\x00'}) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000100)={0x0, 0x8, 0x3, "2980e467c86465f0e2fc798bb143a48c5e47c25d26129b051d32b2c45b750378", 0x77777f7f}) 22:14:40 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', 0x0, 0x300, 0x0, 0x0, 0x0, 0x0) 22:14:40 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, 0x0) 22:14:40 executing program 0: r0 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000140)=0x60) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000180)={'veth0_to_hsr\x00', {0x2, 0x4e21, @multicast1}}) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000200)={0x0, 0x6}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000280)={r2, 0xfffffffffffffffe}, &(0x7f00000002c0)=0x8) r3 = socket$can_bcm(0x1d, 0x2, 0x2) r4 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000080)=0xffffffffffffff04, 0x4) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:40 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', 0x0, 0x500, 0x0, 0x0, 0x0, 0x0) 22:14:40 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:40 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xcb', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:40 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, 0x0) 22:14:40 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x100, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r2, 0x710, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x677, @link='syz0\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x4050) 22:14:40 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', 0x0, 0x500, 0x0, 0x0, 0x0, 0x0) 22:14:41 executing program 0: socket$can_bcm(0x1d, 0x2, 0x2) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x2000) ioctl$TIOCMSET(r0, 0x5418, &(0x7f00000000c0)=0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000080)) 22:14:41 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:41 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syzkaller0\x00'}) 22:14:41 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:41 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, 0x0) 22:14:41 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', 0x0, 0x500, 0x0, 0x0, 0x0, 0x0) 22:14:41 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = dup(r0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0xff}, 0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101080, 0x0) setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) 22:14:41 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:41 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syzkall%r0\x00\x01\x00'}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'bcsh0\x00', {0x2, 0x4e22, @loopback}}) pipe2(&(0x7f0000000080), 0x80000) 22:14:41 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:41 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:41 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:41 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x230f, 0x0, 0x0, 0x0, 0x0) 22:14:41 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @rand_addr=0x4}, 0x2, 0x2, 0x4, 0x1}}, 0x80) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 250.973421][T14078] __ntfs_error: 75 callbacks suppressed [ 250.973432][T14078] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:14:41 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) [ 251.029637][T14088] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 22:14:42 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 251.086648][T14096] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 251.089672][T14093] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 251.099763][T14096] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 251.117807][T14096] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 22:14:42 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000380)={'syzkaller1\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000680)=0x14) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f00000002c0)={{}, 'port1\x00', 0x20, 0x40401, 0x4, 0xfffffffffffffffc, 0x1f, 0x800, 0x8, 0x0, 0x2, 0x2}) connect$can_bcm(r0, &(0x7f00000006c0), 0x26c) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x401, 0x0) connect$rxrpc(r2, &(0x7f0000000140)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) ioctl$VIDIOC_G_PARM(r2, 0xc0cc5615, &(0x7f0000000180)={0xf, @raw_data="09eac46d29b1600fe5997afe96674fec01a0d0ce7e6febde9a83d1c77e688928a4a94e2fde379adc6af09c801f70abd4023c44fd9282ccecb8856b72d934cd2d34b2940d2b4b11be9b3fe37f42836f775b6c46f4905adf6faa9f48c009b3afb139144c8e11ab5684122a7c238b09a2d003248c9daebe02c4d1ce921381267af1502696afcd90d51c89e0a5d812c32ab5f637497d57c8b570fe94cc4d75eb71aad69a08c74e1d7e6e2bd2eeb985fa54388a2633515977b6239423f3c28fcbe0842dbadd3aabd67e0e"}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x1ff}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000100)={0x40, 0x3f, 0x200, 0xfffffffffffffdf1, 0x0, 0xff, 0x3, 0x5270, r3}, 0x20) 22:14:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 251.371992][T14108] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 251.375333][T14096] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 251.441656][T14096] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 251.461480][T14115] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. 22:14:42 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x700, 0x0, 0x0, 0x0, 0x0) 22:14:42 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, 0x0) 22:14:42 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x0, 0x0) ioctl$VIDIOC_G_MODULATOR(r1, 0xc0445636, &(0x7f00000000c0)={0xfff, "f44ce45eb1bd0fdc6e96bc008ba4778fca364c7cbae74c1a4f8e60b7fa5eb009", 0x1000, 0x6, 0xffff, 0x1, 0x1}) r2 = gettid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:42 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:42 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0x0, 0x0, 0x0, 0x0) 22:14:42 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:42 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x700, 0x0, 0x0, 0x0, 0x0) 22:14:42 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000080)=0x8) [ 251.973850][T14149] QAT: Invalid ioctl 22:14:42 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x101000, 0x0) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f00000000c0)=""/209) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) sendmsg$can_bcm(r0, &(0x7f0000000400)={&(0x7f0000000300)={0x1d, r2}, 0x10, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="00000000900800000300000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="010000203c824022e4d8b800"], 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000440)) 22:14:42 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 22:14:42 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:43 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x700, 0x0, 0x0, 0x0, 0x0) 22:14:43 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) 22:14:43 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bridge_slave_1\x00'}) getsockname(r0, &(0x7f0000001040)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f00000010c0)=0x80) 22:14:43 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bridge_slave_1\x00'}) getsockname(r0, &(0x7f0000001040)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f00000010c0)=0x80) 22:14:43 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syzkaller0\x00'}) 22:14:43 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs#', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:43 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f0000000140)='./file0\x00', 0x700, 0x0, 0x0, 0x0, 0x0) 22:14:43 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, 0x0) 22:14:43 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'bridge_slave_1\x00'}) getsockname(r0, &(0x7f0000001040)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f00000010c0)=0x80) 22:14:43 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bridge_slave_1\x00'}) r1 = socket(0x3, 0x800, 0x80) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x3f, 0x37d, 0x7fffffff, 0x814, 0x80000001, 0x40}, 0x7fff}, 0xa) 22:14:43 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x0, 0x0, 0x0, 0x0) 22:14:43 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockname(r0, &(0x7f0000001040)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f00000010c0)=0x80) 22:14:43 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x10000) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000080)=""/104) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:43 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f0000000140)='./file0\x00', 0x700, 0x0, 0x0, 0x0, 0x0) 22:14:43 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs ', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:43 executing program 1: getsockname(0xffffffffffffffff, &(0x7f0000001040)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f00000010c0)=0x80) 22:14:43 executing program 0: creat(0x0, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) clone(0x3ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:43 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, 0x0) 22:14:43 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x0, 0x0) 22:14:43 executing program 1: getsockname(0xffffffffffffffff, &(0x7f0000001040)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f00000010c0)=0x80) 22:14:43 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f0000000140)='./file0\x00', 0x700, 0x0, 0x0, 0x0, 0x0) 22:14:44 executing program 1: getsockname(0xffffffffffffffff, &(0x7f0000001040)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f00000010c0)=0x80) 22:14:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:44 executing program 1: socket$can_bcm(0x1d, 0x2, 0x2) getsockname(0xffffffffffffffff, &(0x7f0000001040)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f00000010c0)=0x80) 22:14:44 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, 0x0) 22:14:44 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x0, 0x0, 0x0, 0x0) 22:14:44 executing program 1: socket$can_bcm(0x1d, 0x2, 0x2) getsockname(0xffffffffffffffff, &(0x7f0000001040)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f00000010c0)=0x80) 22:14:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:44 executing program 0: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x10000, 0x10000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e24, 0xbc, @remote, 0x100000000}}}, &(0x7f00000004c0)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000500)={r2, 0x5}, 0x8) connect$can_bcm(r0, &(0x7f0000000200)={0x1d, r1}, 0x10) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000240)={@null=' \x00', 0x4}) socket$can_bcm(0x1d, 0x2, 0x2) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x1a1c2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000340)={0x7a, 0x9, 0x7, 'queue0\x00', 0x3}) ioctl$TUNSETQUEUE(r3, 0x400454d9, &(0x7f0000000040)={'ip6erspan0\x00', 0x600}) 22:14:44 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', 0x0, 0x700, 0x0, 0x0, 0x0, 0x0) 22:14:44 executing program 1: socket$can_bcm(0x1d, 0x2, 0x2) getsockname(0xffffffffffffffff, &(0x7f0000001040)=@in6={0xa, 0x0, 0x0, @local}, &(0x7f00000010c0)=0x80) 22:14:44 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, 0x0) 22:14:44 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xa, 0x0, 0x0, 0x0, 0x0) 22:14:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x10', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:44 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockname(r0, 0x0, &(0x7f00000010c0)) 22:14:44 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8400, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000008, 0x10, r0, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) restart_syscall() ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'syzkaller0\x00'}) 22:14:44 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', 0x0, 0x700, 0x0, 0x0, 0x0, 0x0) 22:14:44 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockname(r0, 0x0, 0x0) 22:14:44 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xe, 0x0, 0x0, 0x0, 0x0) 22:14:44 executing program 1: creat(0x0, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) clone(0x3ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:44 executing program 0: r0 = msgget(0x3, 0x80) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/137) r1 = socket$can_bcm(0x1d, 0x2, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0xa, 0x209e20, 0x8000000001}, 0x1c1) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0xa0008000]}, 0x2c) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f00000000c0)={'brf\xe7{\x120\x00'}) 22:14:44 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x0f', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:45 executing program 1: creat(0x0, 0x0) ioctl$PPPOEIOCDFWD(0xffffffffffffffff, 0xb101, 0x0) clone(0x3ffd, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000edfff0)={0x77359400, 0x4}, &(0x7f0000048000), 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:45 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, 0x0) 22:14:45 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', 0x0, 0x700, 0x0, 0x0, 0x0, 0x0) 22:14:45 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x10, 0x0, 0x0, 0x0, 0x0) 22:14:45 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x440000, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x1, 0x0, [], [{0x9, 0x550, 0x1, 0x1, 0x1, 0xffffffffffffffff}, {0xbd, 0x400, 0x7f, 0xfffffffffffffffe, 0x0, 0x5}], [[]]}) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f00000000c0), &(0x7f0000000100)=0x4) setxattr$trusted_overlay_nlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L+', 0x40}, 0x28, 0x2) signalfd(r1, &(0x7f0000000240)={0x8}, 0x8) 22:14:45 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:45 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'eql\x00', 0x5900}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x12) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:45 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, 0x0) 22:14:45 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:45 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x48, 0x0, 0x0, 0x0, 0x0) 22:14:45 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:45 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x31d501, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f0000000140)={0xfec0000000000, 0xc, 0x1}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000100), &(0x7f0000000240)=0x4) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r3, 0x40485404, &(0x7f0000000080)={{0xffffffffffffffff, 0x0, 0x5, 0x3, 0x1}, 0x1, 0x94}) 22:14:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'eql\x00', 0x5900}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x12) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:45 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, 0x0) 22:14:45 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:45 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syzkaller0\x00'}) 22:14:46 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, 0x0) 22:14:46 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:46 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101000, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$VIDIOC_S_FBUF(r1, 0x4030560b, &(0x7f0000000200)={0x80, 0x30, &(0x7f0000000100)="5dd988f2dfa627a51b0c5342037532877187160d0bdcbac651194162a0d488927c2b840cfa57ca05453a39600276f999ebe09dd9839f3cd1f2404d28fd31bd0842ab9f128680575a4a79aa439efbcecd1a3ea4b6bfc415062f7986e9b6b3338bc44bdbdc69e7990d29191b46b5329427b13659b0454c38e9e9b9cac81307459aa14b28a85a36ee705911e2d087426bad85b7b5d1af050294356896418d3d32df3a30a01643cbd0db43031dceed066f021cbda338f887b53362af184e9414c5f3e61a292d339363f157c6722221694af5aae4829f97ed", {0x4c, 0x1e8e, 0x33363248, 0xd, 0x4, 0x3, 0xc, 0xb06}}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) accept$ax25(r1, &(0x7f0000000240)={{0x3, @default}, [@null, @default, @rose, @remote, @rose, @netrom, @default, @bcast]}, &(0x7f00000002c0)=0x48) 22:14:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'eql\x00', 0x5900}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x12) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:46 executing program 0: r0 = fanotify_init(0x2, 0x101000) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000)) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:46 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:46 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x60, 0x0, 0x0, 0x0, 0x0) 22:14:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'eql\x00', 0x5900}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x12) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:46 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xe0000, 0x0, 0x0, 0x0, 0x0) 22:14:46 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, 'syzkaller0\x00'}, {0x20, 'syzkaller0\x00'}, {0x20, 'syzkaller0\x00'}, {0x20, '#'}, {}, {0x20, 'syzkaller0\x00'}, {0x20, 'syzkaller0\x00'}, {0x20, 'syzkaller0\x00'}, {0x20, 'bdev'}], 0xa, "1e92da8233234c5c0aca952dce21950e39f1bd0b2c20b1060a6a2c6cf7ec15614531100f92edcebc6090a242acca5b6640b91e15ca52d8fcdfa5d96dcabcb8e56580c6e015bc5c251c84ff549ee1fc697dedb2224beebb07f87a42281dc2f62970221489cd9d92533d566bbc0a23e4194431590f08e9ec47daa03b68cbbe5eabeac9fc00d4cae53f52b93527bef481f5b2435b2b81d2b0c35e893cab285db7e6ee22ee2b069bd9e6485820a91e2f0c38ffc93a503ef81785c5026d3346fd99a4bb174aa94625a24267d28ad4a54e2d87b6b946b5139ec64463f2aff7dc385d32f663f4fd4fcdf7715c3905845cacf9"}, 0x14a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:46 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x48, 0x0, 0x0, 0x0, 0x0) 22:14:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'eql\x00', 0x5900}) socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x12) 22:14:46 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x68, 0x0, 0x0, 0x0, 0x0) 22:14:46 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, 0x0) 22:14:46 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:46 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'eql\x00', 0x5900}) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x12) 22:14:46 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x2, 0x4000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000100)={0x15, 0x110, 0xfa00, {r2, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e21, 0x4, @rand_addr="7d8b1155187bd62d9dae1b1969cf3e66", 0x6}}}, 0x118) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) [ 256.029032][T14438] __ntfs_error: 89 callbacks suppressed [ 256.029044][T14438] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 256.059992][T14438] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 256.096821][T14438] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. [ 256.113572][T14452] ntfs: (device loop3): ntfs_fill_super(): Unable to determine device size. [ 256.181289][T14458] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 256.191156][T14454] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 256.209548][T14454] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 22:14:47 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x12) [ 256.233479][T14454] ntfs: (device loop2): ntfs_fill_super(): Not an NTFS volume. 22:14:47 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'ip6tnl0\x00'}) shmget(0x3, 0x4000, 0x7800007b, &(0x7f0000ff9000/0x4000)=nil) 22:14:47 executing program 1: prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x12) [ 256.342568][T14438] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 256.361341][T14458] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:14:47 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x400000, 0x0, 0x0, 0x0, 0x0) 22:14:47 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, 0x0) 22:14:47 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0xf8c, 0x400400) read$rfkill(r2, &(0x7f00000002c0), 0x8) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f00000004c0)={0x1, @default, @bpq0='bpq0\x00', 0x6, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default]}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bridge_slave_1\x00'}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000380)={'rose0\x00', 0x10000004}) r3 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, 0x0, 0x2, 0x0) poll(0x0, 0xd6, 0x2) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x280200, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) fsetxattr$security_evm(r1, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="05010400000000010051fe4e36b17205b78cfb7792226ac3e49ced25ae4ebb735b0edca3a66a4e26d2ea24cbd7e2c7ea4d900400e3701f3f366d430ebcf8ff1d133f76ebb85619b24dc3c31a91ee9a7085698f6ef3aa6df5367805"], 0x5b, 0x3) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f00000003c0)='./bus\x00', 0xffffffffffffffff, 0x20000000000000) write$P9_RLOCK(r2, &(0x7f0000000300)={0x8, 0x35, 0x1, 0x1}, 0x8) ioctl$IMGETCOUNT(r5, 0x80044943, &(0x7f0000000480)) r6 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r7, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x2) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x3000002, 0x20010, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x2200, 0x0, 0xa0008000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r4, 0xc02c5341, &(0x7f0000000400)) write$RDMA_USER_CM_CMD_GET_EVENT(r7, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) ioctl$VIDIOC_G_AUDOUT(r7, 0x80345631, &(0x7f0000000040)) ioctl$KVM_SET_SREGS(r6, 0x4138ae84, &(0x7f0000000540)={{0x100001, 0x2000, 0xc, 0x3, 0x7, 0x6, 0x0, 0xfffffffffffffbff, 0x0, 0x3e, 0xfffffffffffffe01, 0x6}, {0x116000, 0x3000, 0xf, 0x1, 0x3, 0xdf, 0xffffffff, 0x7fffffff, 0x0, 0x1000, 0x6f1, 0x2}, {0x7000, 0x4000, 0xf, 0x9, 0x5, 0x101, 0xff, 0x100, 0x57f3, 0x3, 0x7, 0x7f}, {0x4000, 0x13000, 0x9, 0x1ff, 0x10001, 0x10001, 0x8000, 0x2, 0x3, 0x1f, 0x5, 0x1}, {0x2001, 0x3000, 0xf, 0x6, 0x7fffffff, 0xf8d, 0x4, 0x0, 0x17, 0x401, 0x5, 0x9}, {0x10000, 0x100002, 0x3, 0x1, 0x2, 0x9d5, 0x6, 0x294, 0x100000000, 0x514, 0x6, 0x1}, {0x3000, 0xf000, 0xf, 0x3, 0x3, 0x1, 0xff, 0x7d95, 0x0, 0x61c3, 0xf63, 0x3f}, {0x6000, 0xf006, 0xb, 0x8, 0x3, 0x0, 0x1ff, 0xc03, 0x7, 0xcfa0, 0x6}, {0xf000, 0xf000}, {0x5000, 0x3000}, 0x40000000, 0x0, 0x103d31d3670b6735, 0x4000, 0xd, 0x2800, 0x10000, [0x4e00000000, 0x100, 0x101, 0x1]}) umount2(&(0x7f0000000080)='./file0\x00', 0x1) socket$caif_seqpacket(0x25, 0x5, 0x4) 22:14:47 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) write$vhci(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="04fc9c005746ac9a8af5544e6f2acc381e08a270b947c3acb1c834b828edc5757df783623536a50a1147ca4cbbf640aa38d609bc6886bef5d87df93e988a2facbeef99c0f03404312d9255b48e4e31d7a35796908480142352683ee1628361c8a2081b96367a476ac43285c121e081ac7cc8b6a6620f7f8b51482dd125ff4360ba24152747c7d71c1927888d62201f9b92993425dfdcfc06d769f572aa58eed1403e0e34a61c0bc5b618203a2951d2adeb9f20024df3895ae5912118c22b70a444d829142be84dca14e38492e495a1cf8d04986cdacc39a8b950116edcb7f08112069ddbdd431fadd7227f4e1e0c"], 0xb5) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x6, 0x20000) 22:14:47 executing program 1: prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x12) 22:14:47 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:47 executing program 1: prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x12) 22:14:47 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_ifreq(r0, 0x8994, &(0x7f0000000000)={'bridge_slave_0\x00', @ifru_ivalue=0x3}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:47 executing program 1: prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x12) 22:14:47 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x74, 0x0, 0x0, 0x0, 0x0) 22:14:47 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:47 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0xf8c, 0x400400) read$rfkill(r2, &(0x7f00000002c0), 0x8) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f00000004c0)={0x1, @default, @bpq0='bpq0\x00', 0x6, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default]}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bridge_slave_1\x00'}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000380)={'rose0\x00', 0x10000004}) r3 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, 0x0, 0x2, 0x0) poll(0x0, 0xd6, 0x2) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x280200, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) fsetxattr$security_evm(r1, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="05010400000000010051fe4e36b17205b78cfb7792226ac3e49ced25ae4ebb735b0edca3a66a4e26d2ea24cbd7e2c7ea4d900400e3701f3f366d430ebcf8ff1d133f76ebb85619b24dc3c31a91ee9a7085698f6ef3aa6df5367805"], 0x5b, 0x3) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f00000003c0)='./bus\x00', 0xffffffffffffffff, 0x20000000000000) write$P9_RLOCK(r2, &(0x7f0000000300)={0x8, 0x35, 0x1, 0x1}, 0x8) ioctl$IMGETCOUNT(r5, 0x80044943, &(0x7f0000000480)) r6 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r7, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x2) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x3000002, 0x20010, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x2200, 0x0, 0xa0008000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r4, 0xc02c5341, &(0x7f0000000400)) write$RDMA_USER_CM_CMD_GET_EVENT(r7, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) ioctl$VIDIOC_G_AUDOUT(r7, 0x80345631, &(0x7f0000000040)) ioctl$KVM_SET_SREGS(r6, 0x4138ae84, &(0x7f0000000540)={{0x100001, 0x2000, 0xc, 0x3, 0x7, 0x6, 0x0, 0xfffffffffffffbff, 0x0, 0x3e, 0xfffffffffffffe01, 0x6}, {0x116000, 0x3000, 0xf, 0x1, 0x3, 0xdf, 0xffffffff, 0x7fffffff, 0x0, 0x1000, 0x6f1, 0x2}, {0x7000, 0x4000, 0xf, 0x9, 0x5, 0x101, 0xff, 0x100, 0x57f3, 0x3, 0x7, 0x7f}, {0x4000, 0x13000, 0x9, 0x1ff, 0x10001, 0x10001, 0x8000, 0x2, 0x3, 0x1f, 0x5, 0x1}, {0x2001, 0x3000, 0xf, 0x6, 0x7fffffff, 0xf8d, 0x4, 0x0, 0x17, 0x401, 0x5, 0x9}, {0x10000, 0x100002, 0x3, 0x1, 0x2, 0x9d5, 0x6, 0x294, 0x100000000, 0x514, 0x6, 0x1}, {0x3000, 0xf000, 0xf, 0x3, 0x3, 0x1, 0xff, 0x7d95, 0x0, 0x61c3, 0xf63, 0x3f}, {0x6000, 0xf006, 0xb, 0x8, 0x3, 0x0, 0x1ff, 0xc03, 0x7, 0xcfa0, 0x6}, {0xf000, 0xf000}, {0x5000, 0x3000}, 0x40000000, 0x0, 0x103d31d3670b6735, 0x4000, 0xd, 0x2800, 0x10000, [0x4e00000000, 0x100, 0x101, 0x1]}) umount2(&(0x7f0000000080)='./file0\x00', 0x1) socket$caif_seqpacket(0x25, 0x5, 0x4) 22:14:47 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0) 22:14:47 executing program 1: prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) 22:14:47 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:47 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:47 executing program 1: prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) 22:14:47 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, 0x0) 22:14:47 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000001140)={0x0, @multicast2, @remote}, &(0x7f0000001180)=0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syzkaller0\x00'}) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000140)={0x0, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1, 0x3, [{{0x2, 0x4e21, @rand_addr=0x5}}, {{0x2, 0x4e24, @multicast2}}, {{0x2, 0x4e22, @empty}}]}, 0x210) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="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"]}) 22:14:48 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0xf8c, 0x400400) read$rfkill(r2, &(0x7f00000002c0), 0x8) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f00000004c0)={0x1, @default, @bpq0='bpq0\x00', 0x6, 'syz1\x00', @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2, 0x1, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @default]}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'bridge_slave_1\x00'}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000380)={'rose0\x00', 0x10000004}) r3 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vimc1(0xffffffffffffff9c, 0x0, 0x2, 0x0) poll(0x0, 0xd6, 0x2) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x280200, 0x0) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) fsetxattr$security_evm(r1, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="05010400000000010051fe4e36b17205b78cfb7792226ac3e49ced25ae4ebb735b0edca3a66a4e26d2ea24cbd7e2c7ea4d900400e3701f3f366d430ebcf8ff1d133f76ebb85619b24dc3c31a91ee9a7085698f6ef3aa6df5367805"], 0x5b, 0x3) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f00000003c0)='./bus\x00', 0xffffffffffffffff, 0x20000000000000) write$P9_RLOCK(r2, &(0x7f0000000300)={0x8, 0x35, 0x1, 0x1}, 0x8) ioctl$IMGETCOUNT(r5, 0x80044943, &(0x7f0000000480)) r6 = creat(&(0x7f0000000340)='./bus\x00', 0x0) r7 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r7, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x2) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x3000002, 0x20010, r2, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x2200, 0x0, 0xa0008000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffa0010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r4, 0xc02c5341, &(0x7f0000000400)) write$RDMA_USER_CM_CMD_GET_EVENT(r7, &(0x7f0000000140)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) ioctl$VIDIOC_G_AUDOUT(r7, 0x80345631, &(0x7f0000000040)) ioctl$KVM_SET_SREGS(r6, 0x4138ae84, &(0x7f0000000540)={{0x100001, 0x2000, 0xc, 0x3, 0x7, 0x6, 0x0, 0xfffffffffffffbff, 0x0, 0x3e, 0xfffffffffffffe01, 0x6}, {0x116000, 0x3000, 0xf, 0x1, 0x3, 0xdf, 0xffffffff, 0x7fffffff, 0x0, 0x1000, 0x6f1, 0x2}, {0x7000, 0x4000, 0xf, 0x9, 0x5, 0x101, 0xff, 0x100, 0x57f3, 0x3, 0x7, 0x7f}, {0x4000, 0x13000, 0x9, 0x1ff, 0x10001, 0x10001, 0x8000, 0x2, 0x3, 0x1f, 0x5, 0x1}, {0x2001, 0x3000, 0xf, 0x6, 0x7fffffff, 0xf8d, 0x4, 0x0, 0x17, 0x401, 0x5, 0x9}, {0x10000, 0x100002, 0x3, 0x1, 0x2, 0x9d5, 0x6, 0x294, 0x100000000, 0x514, 0x6, 0x1}, {0x3000, 0xf000, 0xf, 0x3, 0x3, 0x1, 0xff, 0x7d95, 0x0, 0x61c3, 0xf63, 0x3f}, {0x6000, 0xf006, 0xb, 0x8, 0x3, 0x0, 0x1ff, 0xc03, 0x7, 0xcfa0, 0x6}, {0xf000, 0xf000}, {0x5000, 0x3000}, 0x40000000, 0x0, 0x103d31d3670b6735, 0x4000, 0xd, 0x2800, 0x10000, [0x4e00000000, 0x100, 0x101, 0x1]}) umount2(&(0x7f0000000080)='./file0\x00', 0x1) socket$caif_seqpacket(0x25, 0x5, 0x4) 22:14:48 executing program 1: prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x0) 22:14:48 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) 22:14:48 executing program 0: syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x3, 'veth1_to_bridge\x00', 0x4}, 0x18) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0) 22:14:48 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 22:14:48 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:48 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:48 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'\x00\x00\xdc>\xc6\xfd\xcc\xfb\x14\xfa\x00'}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x135) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000140), &(0x7f00000000c0)=0x4) 22:14:48 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, 0x0) 22:14:48 executing program 1: r0 = shmget$private(0x0, 0x400000, 0x7ff, &(0x7f0000bff000/0x400000)=nil) r1 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x800, 0x10200) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) write$evdev(r1, &(0x7f0000000300)=[{{0x77359400}, 0x3, 0x1, 0x8}, {{r2, r3/1000+30000}, 0x11, 0x5, 0x8}], 0x30) shmctl$SHM_LOCK(r0, 0xb) r4 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x301000) getsockopt$inet_int(r1, 0x0, 0xc, &(0x7f0000000440), &(0x7f0000000480)=0x4) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x6, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r4, &(0x7f0000000140)=[{{0x77359400}, 0x0, 0xffff, 0x4}, {{}, 0x5, 0xb46, 0x6}, {{}, 0x17, 0x3cb, 0x7}, {{0x0, 0x7530}, 0x5, 0x380000000000000, 0x4}, {{r5, r6/1000+10000}, 0x1f, 0x2, 0x100}, {{0x0, 0x7530}, 0x12, 0x8, 0x7}, {{r7, r8/1000+30000}, 0x1f, 0x1ff, 0x7}, {{0x0, 0x7530}, 0x1f, 0x40, 0x16}], 0xc0) write$evdev(r4, &(0x7f0000000280)=[{{}, 0x14}], 0x83) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000400)="b51cb547916a2fff592cead240b82a5f", 0x10) ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f0000000080)=0x7) prctl$PR_GET_DUMPABLE(0x3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000340)={0x6, 0x400, 0x911, 'queue0\x00', 0x7af}) r9 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x4, 0x1) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r9, 0x84, 0x7, &(0x7f0000000040)={0x4}, 0x4) 22:14:48 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:48 executing program 0: socket$can_bcm(0x1d, 0x2, 0x2) listxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/167, 0xa7) r0 = accept4$netrom(0xffffffffffffffff, &(0x7f0000000140)={{0x3, @bcast}, [@default, @netrom, @null, @rose, @netrom, @null, @netrom, @null]}, &(0x7f00000001c0)=0x48, 0x800) r1 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x200, 0x20001) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r2, 0x4, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0xff, @bearer=@udp='udp:syz0\x00'}}}, ["", "", "", "", "", ""]}, 0x30}}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:48 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:48 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) 22:14:48 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 22:14:48 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x03', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:48 executing program 2: rt_sigaction(0x0, &(0x7f0000000d00)={0x0, {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:48 executing program 2: rt_sigaction(0x0, &(0x7f0000000d00)={0x0, {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:48 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'veth1_to_hsr\x00'}) 22:14:48 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000040)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f0000000180)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:48 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0) 22:14:48 executing program 2: rt_sigaction(0x0, &(0x7f0000000d00)={0x0, {0xff}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:49 executing program 2: rt_sigaction(0x32, 0x0, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:49 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$usb(&(0x7f0000001280)='/dev/bus/usb/00#/00#\x00', 0x7ff, 0x200140) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000012c0)={0x7, 0xd9a7, 0x1000, "78cb47f0847b0f"}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfff, 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000001200)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r2, 0x0, 0x1000, 0xb3, &(0x7f0000000100)="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", &(0x7f0000001100)=""/179, 0x68}, 0x28) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000080)) 22:14:49 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x600, 0x0, 0x0, 0x0, 0x0) 22:14:49 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x03', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 258.240402][T14617] FAT-fs (loop1): bogus number of reserved sectors [ 258.259603][T14617] FAT-fs (loop1): Can't find a valid FAT filesystem 22:14:49 executing program 2: rt_sigaction(0x32, 0x0, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:49 executing program 2: rt_sigaction(0x32, 0x0, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:49 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) 22:14:49 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$dmmidi(&(0x7f0000000540)='/dev/dmmidi#\x00', 0x120000, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xfc, 0xa3, &(0x7f0000000080)="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", &(0x7f0000000180)=""/163, 0x7}, 0x28) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000005c0)=0x0) sendmsg$nl_netfilter(r1, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="70000000010300002abd7000fbdbdf25070000095c001c0008001200", @ANYRES32=r0, @ANYBLOB='\b\x009\x00', @ANYRES32=r2, @ANYBLOB="2d2ab26f95dcf8a3d516ca42f228d36cc6e0ebdaad3636b3f138c69c3f417e4687bdfd1779826bf0ede3a5be0db211a1e108001000000000000400630008002200", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00'], 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x40001) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) accept(r0, 0x0, &(0x7f0000000000)) 22:14:49 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {}, 0x0, &(0x7f0000000cc0)="f2450f0f548d5d1c3ec14f1516c4c18e5e00f3410faedfc4e13df10461660f11f8c44115f94decc4617dd3771d660f3821ee36df2f"}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:49 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x700, 0x0, 0x0, 0x0, 0x0) 22:14:49 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, 0x0) 22:14:49 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {}, 0x0, 0x0}, &(0x7f0000000e00)={&(0x7f0000000d40)="f2440f1be6836d8b04c4410572e6a30fa339660f3814cf466e8f2a78106a5a0c000000c4c151ef8f44fb0000660f284d3c670faeb4fa00000021", {}, 0x0, &(0x7f0000000d80)="6746f8660f3831f466430f2eb67dca00000f1148008f891892920500000026660f71e6008f28bca2960000000036f04610a804000000c4e255368d0f000000c4a3296a4f00fd"}, 0x8, &(0x7f0000000e40)) 22:14:49 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000000)={'nr0\x00', 0x4}) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1f, 0x4000) getsockopt$inet_sctp_SCTP_NODELAY(r1, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:49 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x03', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:49 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$dmmidi(&(0x7f0000000540)='/dev/dmmidi#\x00', 0x120000, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xfc, 0xa3, &(0x7f0000000080)="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", &(0x7f0000000180)=""/163, 0x7}, 0x28) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000005c0)=0x0) sendmsg$nl_netfilter(r1, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="70000000010300002abd7000fbdbdf25070000095c001c0008001200", @ANYRES32=r0, @ANYBLOB='\b\x009\x00', @ANYRES32=r2, @ANYBLOB="2d2ab26f95dcf8a3d516ca42f228d36cc6e0ebdaad3636b3f138c69c3f417e4687bdfd1779826bf0ede3a5be0db211a1e108001000000000000400630008002200", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00'], 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x40001) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) accept(r0, 0x0, &(0x7f0000000000)) 22:14:49 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000e40)) 22:14:49 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, 0x0) 22:14:49 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, 0x0) 22:14:49 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000080)=0x4) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f00000000c0)='syzkaller0\x00', 0xb) 22:14:49 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {}, 0x0, 0x0}, 0x0, 0x0, 0x0) 22:14:50 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$dmmidi(&(0x7f0000000540)='/dev/dmmidi#\x00', 0x120000, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xfc, 0xa3, &(0x7f0000000080)="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", &(0x7f0000000180)=""/163, 0x7}, 0x28) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000005c0)=0x0) sendmsg$nl_netfilter(r1, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="70000000010300002abd7000fbdbdf25070000095c001c0008001200", @ANYRES32=r0, @ANYBLOB='\b\x009\x00', @ANYRES32=r2, @ANYBLOB="2d2ab26f95dcf8a3d516ca42f228d36cc6e0ebdaad3636b3f138c69c3f417e4687bdfd1779826bf0ede3a5be0db211a1e108001000000000000400630008002200", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00'], 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x40001) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) accept(r0, 0x0, &(0x7f0000000000)) 22:14:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xc0', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:50 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {}, 0x0, 0x0}, 0x0, 0x0, 0x0) 22:14:50 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, 0x0) 22:14:50 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$dmmidi(&(0x7f0000000540)='/dev/dmmidi#\x00', 0x120000, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xfc, 0xa3, &(0x7f0000000080)="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", &(0x7f0000000180)=""/163, 0x7}, 0x28) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000005c0)=0x0) sendmsg$nl_netfilter(r1, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="70000000010300002abd7000fbdbdf25070000095c001c0008001200", @ANYRES32=r0, @ANYBLOB='\b\x009\x00', @ANYRES32=r2, @ANYBLOB="2d2ab26f95dcf8a3d516ca42f228d36cc6e0ebdaad3636b3f138c69c3f417e4687bdfd1779826bf0ede3a5be0db211a1e108001000000000000400630008002200", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00'], 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x40001) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) accept(r0, 0x0, &(0x7f0000000000)) 22:14:50 executing program 2: rt_sigaction(0x32, &(0x7f0000000d00)={0x0, {}, 0x0, 0x0}, 0x0, 0x0, 0x0) 22:14:50 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, 0x0) 22:14:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:50 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000040)) r2 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000100)='./bus\x00') sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) creat(&(0x7f0000000180)='./bus\x00', 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:50 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'veth0\x00'}) 22:14:50 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$dmmidi(&(0x7f0000000540)='/dev/dmmidi#\x00', 0x120000, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xfc, 0xa3, &(0x7f0000000080)="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", &(0x7f0000000180)=""/163, 0x7}, 0x28) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000005c0)=0x0) sendmsg$nl_netfilter(r1, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)=ANY=[@ANYBLOB="70000000010300002abd7000fbdbdf25070000095c001c0008001200", @ANYRES32=r0, @ANYBLOB='\b\x009\x00', @ANYRES32=r2, @ANYBLOB="2d2ab26f95dcf8a3d516ca42f228d36cc6e0ebdaad3636b3f138c69c3f417e4687bdfd1779826bf0ede3a5be0db211a1e108001000000000000400630008002200", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00'], 0x70}, 0x1, 0x0, 0x0, 0x1}, 0x40001) accept(r0, 0x0, &(0x7f0000000000)) 22:14:50 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, 0x0) 22:14:50 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$dmmidi(&(0x7f0000000540)='/dev/dmmidi#\x00', 0x120000, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xfc, 0xa3, &(0x7f0000000080)="bb49b1c13a697f887dad320c0a3f6cf515c3dc733220f9041e48b8abbf49e8ddf47ede5737966365674cf88aead17a9225525ae612322b2bbbc10ea9185fb2c42debf5929e956d6d0908981b88cf0df6c4d877545786b4bc69a48d3dbdaf1a90847cb4754d9a57f9ab52087086701cdee20212eb46c8b7bdf92964b801a587792d6aae0e151169dd3148d9737dadacf85cb60538f86d6460657aa600e713354e153609ac552c2dfc7f7491f59d7ea27230efa936d833ffde8f2901feca2c4068d55ddd45f757943fa6e640b148462c818ba7d1533cd67670e75575ab380881710bb2b438b228389801ae1c4a158028649149e5a83ebb1cfd9d192777", &(0x7f0000000180)=""/163, 0x7}, 0x28) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000005c0)) accept(r0, 0x0, &(0x7f0000000000)) 22:14:50 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000080)=0x8) 22:14:50 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xf23, 0x0, 0x0, 0x0, 0x0) 22:14:50 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$dmmidi(&(0x7f0000000540)='/dev/dmmidi#\x00', 0x120000, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x0, 0xfc, 0xa3, &(0x7f0000000080)="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", &(0x7f0000000180)=""/163, 0x7}, 0x28) accept(r0, 0x0, &(0x7f0000000000)) [ 259.731916][T14741] FAT-fs (loop2): bogus number of reserved sectors [ 259.762390][T14741] FAT-fs (loop2): Can't find a valid FAT filesystem 22:14:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:50 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) clock_getres(0x7, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:50 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) syz_open_dev$dmmidi(&(0x7f0000000540)='/dev/dmmidi#\x00', 0x120000, 0x80) accept(r0, 0x0, &(0x7f0000000000)) 22:14:50 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x101000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000140)={'filter\x00'}, &(0x7f0000000040)=0x54) mincore(&(0x7f0000ffd000/0x3000)=nil, 0x3000, &(0x7f00000001c0)=""/84) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x40000001000, 0x2c0) 22:14:50 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, 0x0) 22:14:50 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) accept(r0, 0x0, &(0x7f0000000000)) 22:14:50 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:51 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, 0x0) 22:14:51 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000080)=0x30) 22:14:51 executing program 1: accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 22:14:51 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:51 executing program 1: accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 22:14:51 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, 0x0) 22:14:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:51 executing program 1: accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 22:14:51 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = dup3(r0, r0, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000180)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) ioctl$HCIINQUIRY(r1, 0x800448f0, &(0x7f00000002c0)={r2, 0x63, 0xffffffffffffff00, 0x3, 0x1, 0xa7b, 0x3ff}) recvfrom(r0, &(0x7f0000000080)=""/114, 0x72, 0x120, 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:51 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, 0x0) 22:14:51 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, 0x0) 22:14:51 executing program 1: socket$can_bcm(0x1d, 0x2, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 22:14:51 executing program 1: socket$can_bcm(0x1d, 0x2, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 22:14:51 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:51 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:51 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, 0x0) 22:14:51 executing program 1: socket$can_bcm(0x1d, 0x2, 0x2) accept(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 22:14:51 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, 0x0) 22:14:51 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) accept(r0, 0x0, 0x0) 22:14:51 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) [ 261.041863][T14842] __ntfs_error: 138 callbacks suppressed [ 261.041875][T14842] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 261.077605][T14837] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 261.087049][T14847] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 261.112797][T14847] ntfs: (device loop3): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 261.132917][T14842] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 261.148913][T14847] ntfs: (device loop3): ntfs_fill_super(): Not an NTFS volume. [ 261.152721][T14842] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 22:14:52 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000002980)={'lo\x00'}) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000004c0)={0x0, 0x2, 0x20}, &(0x7f0000000500)=0xc) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000029c0)={'filter\x00', 0x7, 0x4, 0x4a8, 0x280, 0x280, 0x280, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@local, @mac=@link_local, @remote, @rand_addr=0x7ff, 0x2, 0xffffffff}}}, {{@arp={@multicast1, @empty, 0x0, 0xffffffff, @empty, {[0x0, 0xff, 0x0, 0xff, 0xff, 0xff]}, @mac=@remote, {[0x0, 0x0, 0xff, 0xff, 0xff]}, 0x10001, 0x1ff, 0x743e, 0x8001, 0x7ff, 0x6, 'teql0\x00', 'vcan0\x00', {}, {0xff}, 0x0, 0x212}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @mac=@broadcast, @loopback, @rand_addr=0x2, 0xf, 0x1}}}, {{@arp={@remote, @local, 0x0, 0xffffffff, @mac=@random="759445d589dd", {[0x0, 0xff, 0x0, 0xff, 0x0, 0xff]}, @mac=@remote, {[0x0, 0x0, 0xff, 0x0, 0x0, 0xff]}, 0xddd3, 0x3, 0x7b2a, 0x9, 0x1, 0x29f, 'lo\x00', 'erspan0\x00', {}, {0xff}, 0x0, 0x20}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @remote, @multicast1, 0xf, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f8) sendmmsg$inet_sctp(r1, &(0x7f0000002880)=[{&(0x7f00000000c0)=@in={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000100)="8349d95a13be00220a9ad1934916372d24751e8931d818fdea8f80eaebfb76c506ab5436c756b7a1fdd3442bd75da34fce080f75359b82ba15a4985fca3b0411776de22ba7b2cef6ce6dbebed89ef16c5d5a47ec6fb06a2d92d7e87c423c00cec0d623d8071d18caa1cdb3d613e576e6d6d1e72613d208b6050392b7bfee5502b66295cc449523aec38b0856d79e4a4d8c0a48cc6e12ec42a274153ccf4a40177c18c9cbd1d0c5bb8e4c47a71355c9847925b1d5307fa0", 0xb7}, {&(0x7f00000001c0)="afb735bb0eb2d027109400843bc472ef1c1e1f06b3679bf2bafe58cc9a5510e23edd629a3f65c117e66338248c5d3a94566c4b23db65543882d6314be0985baaf6e0315fac61e928ec1b15b0f8239b62ed827cff50ac49cd2f8198cf", 0x5c}, {&(0x7f0000000240)="23c248d237bac7c9f95128c420c72106caca4e34b92a1a83034f18ab3bdbb8e60c1d5a149dc2cbbcf134f50da3b187d9a04595ec1dad4e3eeb024b971ddaff02af4e1aee79627f520f511f9a895b61a13d1d72350b86627235641110209d3edcc09ad10c6d9fba19d8d461afc9c96495b80d84d4f472450689d2b136d4fb4375f778d6ceb1d7523b9267c60b70e8021c759ef189d9dc2b45c18151762f698bd648d75d100368c3f54be1fd282a1bffeae95eeef2a7edf493261d0c60b59d74", 0xbf}, {&(0x7f0000000300)="4a4d8fafbb9d7d1a0434dd75e50594b0e296ffe9ec7f7dd4a5c0168190cb6e2afe89d73f4a11f1709511b654c2a112f89db9951a9d68d1d34529dea373adc4e4", 0x40}], 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="2000003b0000000084000000080000000000000000000000000000000080000018000000000000008400000000000000eb04010000000400"], 0x38, 0x24048801}, {&(0x7f00000003c0)=@in={0x2, 0x4e23, @rand_addr=0x5cb}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000400)="97174616099740e49ad342983126a786f4719983f8b38646f12128086dabd18c0dc66c2c67c8c29a1120ec712eafbc6dc2", 0x31}, {&(0x7f0000000440)="fd3283de092d17d7c0", 0x9}], 0x2, &(0x7f0000000540)=[@init={0x18, 0x84, 0x0, {0x7, 0xfff, 0x0, 0x5}}, @sndinfo={0x20, 0x84, 0x2, {0x7, 0x8008, 0xffffffff, 0x3, r2}}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @rand_addr=0x6}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x7f}}, @init={0x18, 0x84, 0x0, {0x5, 0xfffffffffffffffa, 0xf5, 0x1}}, @authinfo={0x18, 0x84, 0x6, {0x5}}, @init={0x18, 0x84, 0x0, {0x80000001, 0x4f041b2d, 0x1, 0x7fff}}, @authinfo={0x18, 0x84, 0x6, {0x7}}], 0xd0, 0x4044}, {&(0x7f0000000640)=@in6={0xa, 0x4e23, 0x3ff, @mcast1, 0x100000001}, 0x1c, &(0x7f0000001740)=[{&(0x7f0000000680)="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", 0x1000}, {&(0x7f0000001680)="0fceaf6165c516c0a2e688b6d122bd27971ff0e43e535989ebe2c88f91670395808f06393c7b3384a778c842f4c071b1718a5b533c4614c9b3f1c726691674af13b8046441b43864c376050f0ac4be5225b0aa18daaf9c7691891b58c8e5985dd2424f427be89917505157ffa7b828c9db", 0x71}, {&(0x7f0000001700)="3554b38451d24982743a53024e366ac04b5ec0af2987a91392701a4daa30847b5efd3be79f16d7c1818f19b64352d8e91e71dabd76470848b15e10fbfba7", 0x3e}], 0x3, &(0x7f0000001780)=[@dstaddrv4={0x18, 0x84, 0x7, @broadcast}, @authinfo={0x18, 0x84, 0x6, {0x8}}, @dstaddrv6={0x20, 0x84, 0x8, @rand_addr="f818c794fedeb6ac8561ec0b39011376"}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x9b0}}], 0x68, 0x10}, {&(0x7f0000001800)=@in={0x2, 0x4e22, @loopback}, 0x10, &(0x7f0000002840)=[{&(0x7f0000001840)="0c898e059bd106d48c13e075e008ad4eeb294e7d402fb5a569addbca6057662016d6d70bb11e9d9f7706d69e776a6a3f1335bc20f366b818fec399e69f85a119211c051834cb16df3e2cf6bc8cd52f39f9880d3c4e0b6bbb15e6baa46804076c1f3bffe5b7a00f339231cd6f1acab8ded9e48c64bd59d27a3e7d531bc7e06b5d437e000461940893eee1bac8e9c633ecbe6d633115b22b9f598d5947ef73c3ab7e6eef3bcbecbe57de70266cd1fc804ad2489c7658fea55c00ea2c57bce8ddfe6a66b3edcbcca8c6f982f37350c3b5afe87644b096226a728d28edb6e8f3ec721df5e22ce9b6646d733ebf172e151f9b2bb3b379a1e3f1bd3724577d91ce77589b4b441ddfdb0d0b6445408e814692be232a89c9be4a8556054b0b343457f753593320a21f35cf81d4acc3aeb25c213b80989d84bf84d763614d2a71b09d1880bda82889e0f091fefc1703864b8af912f9804eae6958eda257bed63f5345bbf9ce702af5c89c1d6b024347dc64ce3a845c914ace941806d44953d3b4f7d19cdb9b007cac54a19825d4c76836e45772d261d8fe900a9ad084c7738832912cbbf35e6fdfee8c69ef71b322404b0f15dcd9202d81a83f2f2d728f43349d71e0064409256d4d2170d855f9777bb67315b0c397c739f63d0e48906011d245cb506a6dd8b2520198d557be25127ac0006b6726c51f441896aa01c32e226847c141a88fb6785ee4fe1c41eef91ec36d5552500671518e97f6c8fa7fe521bc8896c9f8f0cf1f26313336de91472cd0bb93c46275aff00e18bae7c9ce608a59480f9e685b3d940fbb1ce4b14c5cb3d698778583889958380499fd647f3eaa6f79f60f51069c8885ea80702c79b63834b6480094a6221ded6b247d428719dd0ea834cbee515a349cfcec31b87ddb20f24a1f6211b011582170130dba97e96ead08bb857093ef67f1335b207a0fb1bd301408c165b47b6cac2df9f72404586ec7a94f1782fc14201239484e63c0a45db24f672abee02996892aa7f3eb16d24d934397de72f44198cb9a8a46a237711adabb0bfe3c28db3be367b3c474b04c7e5a6933c417e595b45a10055501e033548f3943418c7ad752eeb6e2a37942d9257680553251ba6d253f59639e8ff301d9950c4b4c79e06614d0bc539da86bba34e3b8ae80367f6b921cf8ce1e543d0d1fa2875e2e3a930ef10db09f0da2e870b3316767efde1ed3dd7618e0a709c8c47f39f0bf89ce75302652433405c632c5c26c680e3f54eeda42bf0da0f4ff1634dd8bc00455076feaf8b85c81c4951acb0592a2e737e3ce5839e10160a50bb6aeedf4f992b5986a133e155b8b49c3d1cd87fc835ac3ba3425a66175ca176327489f4b2c778a9bde8e5feea7524e23ad147712aa2003055ae0a643ddcc3f19bfdd3b83779a09b0d4cd4028d6355bca69aafa4c6be8c6f29a98ba2a70d1a23528d38cca697f109d3712175c9a4033c7912368f1001a4a8696a045a00f26baf873b954dce99506f6e882a71b7d67ac2eef05d31e615db6ba5193b9156991ab5cce7e34f5e42315a6fc9fb0abb3a2d0e28360756663c906bef00c6cd50bcde1fc9b07342186bab7f64f7061746ce0da26efea8107d0bab7799d945657867a13970d5e957dff2c70b404dee95a79f46ac25fa08d259b5f6cb14403f9b4d4413210f1cea19e0a286bc07c26913e7bffc4244a611e66eb08e3bc34f2992895cbb7c27a09023e4584ef6adc51121186f20c9e7d0456487ff766dcf5132a5bdbd90acbfece06c2310c31b317b2021656eb86d7032d8b433ffd0a9ca03bbf7384f7af6a7b26da0e552c4d7b6e0644e82367f6a78e969b351a80010cb2572550a4e9a3f36ceed6b7592ad92aaf2c296f470311d0cbc04c9773c708fb37814e41a6c30ae3a00adf8f2a6099de958d7620c92d065ca84dd89e28a83afa3cb1f9c0b008a4b115d8efafaaa556819643fb23b8af4723d5c17eb476b90b716475b0bad80a70ce28c8808e531c3398e0b26413ab23227f5142424d2b7f63f01f96fbe1299848a7cf7f421584ca9900bf3610aa53e2e31b81a5ff0905f9068a93599da91e22088de9ca9b0f2674d658ec5a44dd5d9b91e9873c756a4c84d8dd451e1020b27af222d25a90174cd5ffd5c6edcb87dca06e25960460a9aa69f0000c51940476fbf73d85f02284d5f59574b0de501afecdba803803235e6918e682a11468b9b23acb1def2ee1c7ada41be09a1246cca3f30d5107e30081d75c30330b556f073c871dd1ae0644c4317d78dcc977a92477018d738e9a574b77f052347750b7e6f26c622e2f3517421d3946710d530e9400e3d036d57ec9efc9f52bec21dbe30a4a72a8badd2a9d674a7daff4f40b912d22843960d3fce7e1eb09d6852b99c7cda55680f0fd8637267041265f8fd042ae84fa7acc0745e6a6de8a88890c2c0b1c7834de7e22b5c686c3bdef56faf5ce098af849f8786ad16bc9deee74ed43b1ca5770329f481dba7597bd39dcbc2e798a141c3d52c35f802c76b98643d8bfa2a0c80fb060f338a36ad215296c279d8f0f033b1f419fa4570d8db9b1c9674a06e6e5b690358a3a4268e25883c3d3b426eeacbfd94822467661bf138011f3c56d22a6aebe0c1f0ea6328e091047e60e6cc6f2c35e20fe394983c13c1a191788eb2d1b266b099a69a9ac77c56cc13bbb38da4ee813f1c5ca6a31c21f45f8c933a4b37ea4d73c24ac35231aa320db194b4b2a0e5b43737b2ac2112f5278e775424d37f12c68da6ab38b114185e86c12a2ba91fbabb2293dd62460cfaa3b62108990f3b729ab90a4f7f4914b350b1ecd074fc3ccbf58b440a1693d40ce2f54ccabafa614fbc671c1f8f82587fd76cf2652565dee7aef84e18a6ae6f5faad5973b710a2235dc40dd1057404f60fb94679e96af583ac2a3106f341a964d99fbdc6c447ad320cc9090b3ab37d8264129e23ab276382779f1872ffa58eedba36c8e2e4d4d8699ee2aba3b35ec237bee847ffbf4c4ac215d3551180b7509c7e091d987b12e3c1ea00e41121be1f7957b0caf768a2e9fbd6a7a40dbdc712c55e470dd6a474eb151a06031fa69217d5de00e00a100047a68bf5df20252d0d7f4bd72c30895287b22b2df279bfeef48ea82e425f1f66c4387fa0f674c1fe030294ba5fbcc989adfd5edae25e54184299151c49b61f1d91d6875f800f6ee7be8677212df9b0129936747a36dfde09b4bbf0c3235f5dd9d22b4d5b9a6da8d9e32e5e82a269ee20fbb36f6bec0a19b1da271c5a3c29b565949c9e29cc52b7ac538e7e99c5738506e22a612b4de7cd7a046654309ab295cdd2a67b044173dda57c5c70d800e1d5767fd4b416e8352c753d4c2697f2f65b6fe8f5a6f0a50a23dfd47cbd02c106a160155a7376c68db4ea8a66c5ea30bb288b161ee12b9f88682e4bd92a201715fe4e889f8b0b31de4f26a96b48221bc1fc9221abee6329499508512a56f0f4a57832a6f5649815edc657bb169092bd3a9d4f454a104c2c2bc343b030a8c146ca4a4c82eba3883a5f1e6e76c96f55f51af5a4d896104f9facc986db62df0ee67c5ad29b36aec4842c44910161a7523b7844da20f57ae7f560a1ef380634d73865ad94caff9327c54df9ba1b6917ca9445237f1ba76698a8c22f798185627e6bc5baa81cbe482fcdc34748f7889a9c66cdc349d2a182166bef510abad396a8fc45623ce1cd6cedc6396b022d7ad240ff52383265fac339f7729f126a38f97f0baa06fe9245b9b4c2ab7f27d6e435047caa7197e3c185a57cbace5e4f630682b1f402d5bd22e7ea37d93ce6b0afebc844c33d62d0ff3fa37d3184de1364a111040096d4fcbf8d9a06dca7583f10139df0b4f2c3f5bbc8baa995a517f43a1fad2b394d80112f4bf55d4de9e2bc07e173b9ae6c344758934896f7273034d4117d2b998fe1b9f29c136e463ee15cba62bf18f67ca178272c8ee4a95a51114c39d383c5cbcc8d4c236c60b54f957ee135763657cc72cc499f899c874bfcbcaf2376875dced17d798148f7fddb711396a2ac358ae34b7fa41dc93e3caa06cf6eaac89617df5d80461cb8f549f805c6ab96b9075a1f34672f28065b6e134f318bfc75a9ee7334e6d465b04410247a39869236a9c1109b9b316f86067a57d2b6547efb7702b053c145ecd38c4934d3c4a393a03546c2d47b3827285e157fb8422188ebaa1a3abc36851627d8aaa6c12a39fc9407606f7ecaa2b032a52abc7cd4fd12d4a49215071d69318f475e802f7eb9254f6853c4639ef35bea7ec57c35bbe728f988b8fdf5d4d364c526e51dd19c7cf62c3f282cb08ca855c65d034f900bb2ab576591292296ddc0417cab011567a1dff70e201410169e984f9824f9ffc527a37b4081a44e5d70d2dae9baf6c1c62c0518917c01a6678dc821f5c084b6d4f2a489288f5c7f812e68a1f582cdac6876c1e640dbf20052fa2e12199639300bfa82cf1fb5eee934fb57ee5354282fb8485591bacd6e8edb4c6d0e73738aa5009c05fdfb63692d5ae3603c4a4ec34f5b51f1e5c83a4b83f5445c57c2dd54eea65a4b90e69782a4a2e826ed62ca17ac321561883ee24d9fb6fabf0d9a78bc11f924b9073e0e5e02c4845673de2452926009028f7e1529f8c9a20eae4916bccf93843cd6446b29818686de92c4baac2de4a7af6cbdc61bcef41376e2f6abc331363e8dfb2dd5fc287019435ca2055b8ea01f509b0b58541fde5f9769d621c3f550874f0a305ba026406193f59d8206b607a79b5c2aadb5eca7f1b968d210eb2a96d7a931b2215ebb9904a1376834a1e07036b2bd80a530d4a7adbc4d4b50d4def8a14944ab0ca77f4c76668ec8682cb7114070b927ec27bb33d485f4769f51e5dfdbbfddef899eeb085d95640b4ee59d3ca3483a88dfafe9d177ad9f79f55592bd061988fca897ccca11fd51a1bae21a993d1453ea05ccead3caef815c761a49372f8b0b76b11633741baa031ebef3f6988c5a63c94faafa33330a5ded35f708e7de0579912f69eb3eb5759bf77dea81722725711d0640a5baaeaf3ca74473ee4e6c935a86f78252530a3b4f8c9d6dee6b32d2955b9c53c7cb214ce8865f81308bb3f3f52d205f718810eedfc8575141af75d7b85ef4be3f1a9b4c12bb19b7c29d2fa0231527a289bf0bb6e04ef0e288a78d04e859dfd2ea64eecaff3ab7c4ad921b8e184ea9c8c7b267ef38f84c663c80d8985865c01cbe1de4c5feb3c168f1deb5bcb13acc3a842c05ae6eaf6c601711e4f4505af12f0579d07f8a258f04b990e02c71cae45e31173a19a32146a1bd097fec5a63eea8eac6f82317e8daebee151c0c3308d9ef00e52bb943d585a5d2918dc045d8e540f280e2291d77a964f3929d8a56c6327c04de946f54acb084535ad9c4ceb4ddb35f309b0d37784c6c90dcbeb70c099faae28de19b1107bff0a604b0f4d13cd397394c1318d5c749af6712253a11a4ba9e174b22942a0dd8f2e13a8d42720b5719281497be37f68426e5c6ec4b1b23887645c6f82e11cc67469b694d9c5de930f5979d36edad8b122118c6358831bd56074204a74a6d04964565cde3b79a70a2c9a62649d0c65abc42b6c3d0e3c9b305e65c20b1da6280b97870987911e65ef0b8e176e56e807f9b97f7efba15a772b8adc80a1b08e7bec76f75f0439dac16fab905dfd48765f3f6259a5f53c397660b6df5602c87ec801491fd2f85d634202f9422d46a1f2fe2276a84ae516bafce76d148501647356b5d47a096dbd81235751c4d7c8b33e949014342597361c0764c", 0x1000}], 0x1, 0x0, 0x0, 0x4000}], 0x4, 0x4) 22:14:52 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:52 executing program 1: r0 = getpgid(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x200000, 0x0) recvfrom(r1, &(0x7f0000000100)=""/210, 0xd2, 0x12000, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3, 0x4, 0x1}}, 0x80) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x80182, 0x0) write$rfkill(r3, &(0x7f0000000000)={0x0, 0x0, 0x3}, 0x8) sched_getscheduler(r0) r4 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r4, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$evdev(r4, &(0x7f0000000080)=[{{r5, r6/1000+30000}, 0x11, 0xffffffffffffff80, 0x9}, {{0x77359400}, 0x3, 0x7f, 0x1b8d}, {{r7, r8/1000+10000}, 0x14, 0x2, 0xfffffffffffffffd}], 0x48) ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f0000000240)=0x200) 22:14:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 261.330452][T14842] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 261.349052][T14842] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 261.354152][T14847] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. 22:14:52 executing program 1: r0 = getpgid(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x200000, 0x0) recvfrom(r1, &(0x7f0000000100)=""/210, 0xd2, 0x12000, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3, 0x4, 0x1}}, 0x80) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x80182, 0x0) write$rfkill(r3, &(0x7f0000000000)={0x0, 0x0, 0x3}, 0x8) sched_getscheduler(r0) r4 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r4, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$evdev(r4, &(0x7f0000000080)=[{{r5, r6/1000+30000}, 0x11, 0xffffffffffffff80, 0x9}, {{0x77359400}, 0x3, 0x7f, 0x1b8d}, {{r7, r8/1000+10000}, 0x14, 0x2, 0xfffffffffffffffd}], 0x48) ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f0000000240)=0x200) 22:14:52 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x400, 0x0) ioctl$TIOCCBRK(r1, 0x5428) 22:14:52 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, 0x0) 22:14:52 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:52 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, 0x0) 22:14:52 executing program 1: r0 = getpgid(0x0) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x200000, 0x0) recvfrom(r1, &(0x7f0000000100)=""/210, 0xd2, 0x12000, &(0x7f0000000300)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3, 0x4, 0x1}}, 0x80) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x80182, 0x0) write$rfkill(r3, &(0x7f0000000000)={0x0, 0x0, 0x3}, 0x8) sched_getscheduler(r0) r4 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r4, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$evdev(r4, &(0x7f0000000080)=[{{r5, r6/1000+30000}, 0x11, 0xffffffffffffff80, 0x9}, {{0x77359400}, 0x3, 0x7f, 0x1b8d}, {{r7, r8/1000+10000}, 0x14, 0x2, 0xfffffffffffffffd}], 0x48) ioctl$EVIOCSCLOCKID(r4, 0x400445a0, &(0x7f0000000240)=0x200) 22:14:52 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000140)={@loopback, 0x6f, r1}) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000180)={'syzkaller7\x00'}) 22:14:52 executing program 2: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:52 executing program 1: r0 = semget$private(0x0, 0x3, 0x10) semctl$GETZCNT(r0, 0x1, 0xf, &(0x7f0000000000)=""/128) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:14:52 executing program 2: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:52 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='syzkaller0\x00') 22:14:52 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x230f0000, 0x0, 0x0, 0x0, 0x0) 22:14:52 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x6, 0x81, 0xffff, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(r0, 0x8, r1) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x80, 0x80000) setsockopt$inet6_tcp_int(r2, 0x6, 0x3, &(0x7f0000000240)=0xf6, 0x4) r3 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2, 0x406400) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x101000, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r0) write$evdev(r3, &(0x7f0000000000)=[{{}, 0x14, 0x71c}], 0x18) 22:14:52 executing program 2: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:52 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'eql\x00'}) 22:14:52 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x230f, 0x0, 0x0, 0x0, 0x0) 22:14:52 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:53 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:53 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x6, 0x81, 0xffff, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(r0, 0x8, r1) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x80, 0x80000) setsockopt$inet6_tcp_int(r2, 0x6, 0x3, &(0x7f0000000240)=0xf6, 0x4) r3 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2, 0x406400) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x101000, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r0) write$evdev(r3, &(0x7f0000000000)=[{{}, 0x14, 0x71c}], 0x18) 22:14:53 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0xc00, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x6, @bearer=@udp='udp:syz0\x00'}}}}, 0x30}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:53 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, 0x0) 22:14:53 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x6, 0x81, 0xffff, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(r0, 0x8, r1) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x80, 0x80000) setsockopt$inet6_tcp_int(r2, 0x6, 0x3, &(0x7f0000000240)=0xf6, 0x4) r3 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2, 0x406400) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x101000, 0x0) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r0) write$evdev(r3, &(0x7f0000000000)=[{{}, 0x14, 0x71c}], 0x18) 22:14:53 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:53 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:53 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, 0x0) 22:14:53 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x6, 0x81, 0xffff, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(r0, 0x8, r1) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x80, 0x80000) setsockopt$inet6_tcp_int(r2, 0x6, 0x3, &(0x7f0000000240)=0xf6, 0x4) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2, 0x406400) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x101000, 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) 22:14:53 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:53 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) sendmsg$can_bcm(r0, &(0x7f0000000440)={&(0x7f0000000340)={0x1d, r1}, 0x10, &(0x7f0000000400)={&(0x7f0000000380)={0x1, 0x80, 0x8000, {0x77359400}, {0x0, 0x7530}, {0x4, 0xfff, 0x80000000, 0x5}, 0x1, @canfd={{0x4, 0x4, 0xdf5, 0x3}, 0x3d, 0x1, 0x0, 0x0, "743fd856ff4905e4703bf9d887ebe1967b3229576d5373ba8e72bf22daeed158205f7e5b816456e3a9387886770bc6415f1b04541491ac7b7efbf7164bae36b8"}}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) 22:14:53 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, 0x0) 22:14:53 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x6, 0x81, 0xffff, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(r0, 0x8, r1) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x80, 0x80000) setsockopt$inet6_tcp_int(r2, 0x6, 0x3, &(0x7f0000000240)=0xf6, 0x4) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2, 0x406400) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x101000, 0x0) 22:14:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:53 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:53 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x6, 0x81, 0xffff, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(r0, 0x8, r1) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x80, 0x80000) setsockopt$inet6_tcp_int(r2, 0x6, 0x3, &(0x7f0000000240)=0xf6, 0x4) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x2, 0x406400) 22:14:53 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) modify_ldt$write2(0x11, &(0x7f0000000000)={0x9cd4, 0x1000, 0x4000, 0x80, 0xcaa, 0x8, 0x1, 0x4, 0x9000000000, 0x1}, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'syzkaller0\x00'}) r1 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e23, 0x473f, @local, 0x8}, 0x1c) 22:14:53 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 22:14:53 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x6, 0x81, 0xffff, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(r0, 0x8, r1) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x80, 0x80000) setsockopt$inet6_tcp_int(r2, 0x6, 0x3, &(0x7f0000000240)=0xf6, 0x4) 22:14:53 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, 0x0) 22:14:53 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:53 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffff, 0x301203) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r2, 0x4008556c, &(0x7f00000000c0)='syz0\x00') r3 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x8, 0x101000) ioctl$KVM_SIGNAL_MSI(r3, 0x4020aea5, &(0x7f0000000140)={0x1, 0x0, 0xfffffffffffff2a9, 0x400, 0x7fffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 22:14:53 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x6, 0x81, 0xffff, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(r0, 0x8, r1) accept4(0xffffffffffffff9c, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000200)=0x80, 0x80000) 22:14:53 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:53 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, 0x0) 22:14:53 executing program 1: r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x6, 0x81, 0xffff, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(r0, 0x8, r1) 22:14:54 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) [ 263.125295][T15009] QAT: Invalid ioctl [ 263.142316][T15018] QAT: Invalid ioctl 22:14:54 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x6, 0x81, 0xffff, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) fcntl$getown(0xffffffffffffff9c, 0x9) 22:14:54 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) fgetxattr(r0, &(0x7f0000000000)=@random={'osx.', '\x00'}, &(0x7f0000000080)=""/25, 0x19) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:54 executing program 2: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:54 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, 0x0) 22:14:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:54 executing program 2: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:54 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x6, 0x81, 0xffff, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:54 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, 0x0) 22:14:54 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:54 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e22, @multicast1}}, [0xbd28, 0x9, 0x11, 0x20000, 0xff, 0x4, 0x7f, 0xf5, 0xa8a4, 0x27e, 0x44a80282, 0x8001, 0xcc, 0xb22b, 0x3]}, &(0x7f00000002c0)=0x100) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000300)={r1, 0x8, 0x30, 0x0, 0x9}, &(0x7f0000000340)=0x18) r2 = socket$can_bcm(0x1d, 0x2, 0x2) r3 = accept4(r2, &(0x7f0000000080)=@ethernet={0x0, @remote}, &(0x7f0000000000)=0x80, 0x80800) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000100)={0x2, [0x81, 0xfffffffffffffff9]}, &(0x7f0000000140)=0x8) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:54 executing program 2: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:54 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:54 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) 22:14:54 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, 0x0) 22:14:54 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6000, 0x0, 0x0, 0x0, 0x0) 22:14:54 executing program 1: perf_event_open$cgroup(0x0, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:54 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syzkall`r0\xff\x7f\x00\x0e\x00'}) 22:14:54 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) 22:14:54 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x6, 0x81, 0xffff, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:54 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:54 executing program 0: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0xa0100, 0x0) syncfs(r0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:54 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) 22:14:54 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x81, 0xffff, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:55 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0xffff, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:55 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f00000000c0)=@md5={0x1, "738280e8509093443e9e5d522846a454"}, 0x11, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'syzkaller0\x00'}) r1 = socket$xdp(0x2c, 0x3, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000100)) 22:14:55 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, 0x0) 22:14:55 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:55 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, 0x0) 22:14:55 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:55 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:55 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:55 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x82) setsockopt(r0, 0x9, 0x3, &(0x7f0000000080)="e29dc5551a6bb2c45733fd1aa4ddb7104d1ebd1e44ee8ad3a69397237ec8453f74700b1382d0b5e130a2703725e1f832f23d07706f1c0ba555a47bc41409946b0ad28ec51447bc70ed97ed339ec8da60249b6f77b5d5f3462ad44e9a4ae118ad3449d37a5080092c257e5c1c7709b3b28eab0c9132064c784b1f450b03d1ee70ad72321613f32e37d90d7eff931adf07b1a458abfb0ac0ad36b23bc3d84bae6907f5e9", 0xa3) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'ip6erspan0\x00'}) 22:14:55 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:55 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, 0x0) 22:14:55 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:55 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, 0x0) 22:14:55 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:55 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000080)=[@in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x4e21, 0x1, @dev={0xfe, 0x80, [], 0x1f}, 0x7}, @in6={0xa, 0x4e24, 0x5, @remote, 0x9}, @in={0x2, 0x17, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e20, 0xffffffff, @remote, 0x80000000}, @in={0x2, 0x4e23, @local}], 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:55 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:55 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:55 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syzkaller0\x00'}) 22:14:55 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:55 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, 0x0) 22:14:55 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:55 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:55 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, 0x0) 22:14:55 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) open_by_handle_at(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x800) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000100)={0xc029, 0x3}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x410400, 0x0) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000080)) 22:14:55 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:55 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:55 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, 0x0) 22:14:56 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:56 executing program 2: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:56 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x80000, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x2, 0x13, 0x4, 0x0, 0x26, 0x0, 0x70bd28, 0x25dfdbfc, [@sadb_x_policy={0x8, 0x12, 0x0, 0x4, 0x0, 0x0, 0x2, {0x6, 0x33, 0x6, 0x8, 0x0, 0x1000, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x1e}, @in=@multicast1}}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e20, 0x0, @rand_addr="773878ca6f0b7d5ba3ea5df1dc2e8c60", 0xb0e}, @in={0x2, 0x4e22, @remote}}, @sadb_x_sa2={0x2, 0x13, 0x73bf, 0x0, 0x0, 0x70bd29, 0x3506}, @sadb_address={0x5, 0x6, 0x32, 0xa0, 0x0, @in6={0xa, 0x4e20, 0x8, @mcast2, 0x5}}, @sadb_key={0x5, 0x9, 0xe0, 0x0, "b18b1d1bc6b3454c5026a70b0e042784ae5bacce4d8d22712b1d77fd"}, @sadb_x_nat_t_type={0x1, 0x14, 0x1}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e20, 0x800, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x9}, @in6={0xa, 0x4e20, 0x9, @rand_addr="282819b1f126d2c0a23a510d1ebde5c5", 0x1}}]}, 0x130}}, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:56 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:56 executing program 2: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:56 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, 0x0) 22:14:56 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, 0x0) 22:14:56 executing program 2: ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:56 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:56 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x0, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:56 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) fcntl$setstatus(r0, 0x4, 0x44000) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r1, 0x400000000000001) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nr0\x00'}) 22:14:56 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:56 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x0, 0x0) 22:14:56 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:56 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x0, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:56 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xe0000, 0x0, 0x0, 0x0, 0x0) 22:14:56 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x0, 0x28001) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:56 executing program 0: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) getsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f00000001c0), 0x4) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000080)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000100)={0x0, 0x1, 0xc, 0x5, 0x20, 0x8, 0x3, 0x20, r2}, &(0x7f0000000140)=0x20) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:56 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:56 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:56 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, 0x0) 22:14:56 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) [ 266.050295][T15250] __ntfs_error: 150 callbacks suppressed [ 266.050307][T15250] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. 22:14:57 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) [ 266.097973][T15260] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 266.101741][T15250] ntfs: (device loop3): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 266.136884][T15250] ntfs: (device loop3): ntfs_fill_super(): Not an NTFS volume. 22:14:57 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) [ 266.172230][T15264] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 266.206837][T15264] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 266.220241][T15264] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 22:14:57 executing program 0: syz_init_net_socket$llc(0x1a, 0x2, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bat`\xb9v0\x00\x00\x00\xd1\x00\x04\x00\xeb\x00'}) 22:14:57 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0) [ 266.244361][T15260] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:14:57 executing program 2: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:57 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:57 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x141500, 0x0) 22:14:57 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x359dad5, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) [ 266.390583][T15264] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 266.408453][T15264] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 22:14:57 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:57 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, 0x0) 22:14:57 executing program 2: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:57 executing program 0: socket$can_bcm(0x1d, 0x2, 0x2) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x82040) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000000040)={0x1, 0x9}) sendto$isdn(r0, &(0x7f0000000100)={0x2, 0x4d, "f9"}, 0x9, 0x8050, &(0x7f00000000c0)={0x22, 0xfff, 0x1ff, 0x2, 0x3ff}, 0x6) getresuid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000180)=0x0) setuid(r1) 22:14:57 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59366ccf, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:57 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) 22:14:57 executing program 2: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x4, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:57 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:57 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:57 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, 0x0) 22:14:57 executing program 0: clock_gettime(0x0, &(0x7f00000018c0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000001240)=[{&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f0000000100)=""/238, 0xee}, {&(0x7f0000000200)=""/55, 0x37}, {&(0x7f0000000240)=""/4096, 0x1000}], 0x4, &(0x7f0000001280)=""/87, 0x57}, 0xffffffff}, {{&(0x7f0000001300)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000001380)=""/168, 0xa8}, {&(0x7f0000001440)=""/173, 0xad}], 0x2, &(0x7f0000001540)=""/110, 0x6e}, 0x8}, {{0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f00000015c0)=""/43, 0x2b}, {&(0x7f0000001600)=""/71, 0x47}, {&(0x7f0000001680)=""/19, 0x13}], 0x3, &(0x7f0000001700)=""/209, 0xd1}, 0x5}], 0x3, 0x100, &(0x7f0000001900)={r0, r1+30000000}) setsockopt$bt_hci_HCI_DATA_DIR(r2, 0x0, 0x1, &(0x7f0000001940)=0x80000000, 0x4) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000001c00)="f232b2d8a2d964d2ce7ae0ad16a755722090738062b3c7715ef9a8db6b25a64217b0c40477e96f13c7b081828b0674fbb741f6e3941e00e8968153442251c37adf2d3c6e8b28a7bfd5a642c0abd481ca5d6a096a4ba1576fe26cc0bbbfda72bf3adbad2756c5de685cf7c4255bd2f509fcad") sendmmsg$nfc_llcp(r2, &(0x7f0000001d00)=[{&(0x7f0000001980)={0x27, 0x0, 0x2, 0x7, 0xe6, 0x70, "809922e03742e5f39fc8649922a79b42991acae19e174c1ecd96ec13f5e17e2a27ce8d6fe7d1149f45b61d9a702de76573b463ab3b954b353b4836b50ffdc2", 0xc}, 0x60, &(0x7f0000001bc0)=[{&(0x7f0000001a00)="0a697cabd28412d642672a3de1d62a1d728f4c0d09aacbf9574bcb5bee8cf9f5f99397bfa1b851afbb9fb79251f2210a0e64c091b14b860dd82bb457b2d743d4b7c33a5de273b6b6cf1286ed5234ef6a155ca2aca0f5d195d0ba9a83b7461601d5b645a2e10530cdf08c157fe6a9782dde9fd555140eacd65793f30003b05adc9c359b86c089398460a7b0bf0350a03e734d7bf9a124a1130dcb24d9cf6b30118423a66a6a2a2ee4bc495da98474bfe1fa55a24a9a5855fd5dd2c4417d847c7cb9dff9fc5c42724981e5109877239a0d257ed72a0c428551c9241c122221d962f8ead763c05dd5f21fc4df9dc717", 0xee}, {&(0x7f0000001b00)="f1f47be998dbf8901fe1a837c75b8b4337f0d1fa0a53e1254ff31f7a3672e29297789f1dc426dac3698e764ad587eb05354f916f3436626fcbdf4cf72d6b35350a002a9425f33ab0b4abfa9b293812d6f32f47b5b10469d461a6a50dc962ca2b5e88bbab745bb1ef", 0x68}, {&(0x7f0000001b80)="17e077bb", 0x4}], 0x3, &(0x7f0000001d40)=ANY=[@ANYBLOB="f8000000000000000000010019ae74eb70653619eaf43a5da981e3b91ad9d05b5875ae031dcd76eaa330eb5eb931646bbf1b6000bcc261bc9feb1887905be2d936f1f87f403ffdbaac1bb0020100c1f1c84a12bd8992d58c771745a2c2de715d504dd184d832a53e6755e867414de9533d77fd21e456b4f767a0b77047a3064771df4037562ce9aa74fd2aea67823c54ab785d036177d846e9aa2770f6fe0dd48a17c25ded153041b55e306e77cce10c1a847ba476c25d92d91219fed67cb43f13e1b7def0bc6280da95176b74fffb17cdbb9703c3d2579df3eb3de488d0a637e88f08da57e6ec4af72fd7726ec700000000000033b76c34a70a5b40bd4a9e191997f9db42fee94aa9124b0b2c78f6031bfe687f6d68dbac46348c28b6e6d589acccaf9ca2eec77f9a610ca4fbbc"], 0xf8, 0x20000000}], 0x1, 0x0) 22:14:57 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) 22:14:57 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:57 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, 0x0) 22:14:57 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:58 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:58 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x0, 0x0) 22:14:58 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) 22:14:58 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x2000, 0x0) write$FUSE_WRITE(r1, &(0x7f0000000080)={0x18, 0x0, 0x5, {0x8}}, 0x18) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f00000000c0)={{0x0, 0x0, 0xffff, 0x3, 0x3ff}, 0x1, 0x4, 'id1\x00', 'timer0\x00', 0x0, 0x8, 0x8001, 0x9f, 0x2}) 22:14:58 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:58 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:58 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0) 22:14:58 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:58 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) 22:14:58 executing program 0: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'\x00\x00\xe7\"\x00'}) 22:14:58 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:58 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:58 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, 0x0) 22:14:58 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x20, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:58 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = geteuid() syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000080)='./file0\x00', 0x4, 0x2, &(0x7f0000000180)=[{&(0x7f00000000c0)="5ff0f9ca7bddf175cdf4e4d44b604d8d49c909e765d5e87350d655daab4d51bd0c3c206217755256c9d72d7669f668", 0x2f, 0xa0}, {&(0x7f0000000100)="a65f133ed152c66e54f2e015c19341dcfdde2be21ad0307cf1f2d2932fd495374c9910002de7dca8f2a5406645f261fe41c7a7a11dfa11aa0255667edc1ada523995c06df4ca2a9b", 0x48, 0x1}], 0x1040, &(0x7f0000000280)={[{@fat=@quiet='quiet'}], [{@dont_measure='dont_measure'}, {@fowner_eq={'fowner', 0x3d, r1}}, {@appraise='appraise'}, {@obj_user={'obj_user', 0x3d, 'md5sumGPL(system'}}, {@fowner_gt={'fowner>', r2}}, {@obj_user={'obj_user', 0x3d, 'bdev@GPL\x00'}}]}) 22:14:58 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:58 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, 0x0) 22:14:58 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:58 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:58 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:58 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x0, 0x0) 22:14:58 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:58 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "cc596ba4704438afa55d33adda0d5e6c084966f4a7dfc575e9fa58c230f67eef"}) 22:14:58 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:58 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x400000, 0x0) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f0000000080)) 22:14:58 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, 0x0) 22:14:58 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) 22:14:58 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:59 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000000)={@dev, @empty, 0x0}, &(0x7f0000000080)=0xc) r2 = add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="89e82a835b3fdfd2df86543a2ca00a5561264873577d78ef9dd67c99f90a94e6e07db2be31a5a39a18f00c78b7cf5f5458f4751b2f332ac60b8dd673bbc967227be5dc8e178fe8a66d2de62a7e94749d", 0x50, 0xfffffffffffffffa) r3 = request_key(&(0x7f0000000300)='asymmetric\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='\x00', 0xfffffffffffffffa) keyctl$unlink(0x9, r2, r3) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d, r1}, 0x10, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="00000000020400000300000000000000", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="01000060010000000100004007030000a9a1ffe93461979d03279f096c2984808f9ba35424120e1fd9a681cec31c3545b0a5b08bd5f1547bc235faadac5a836060e6733805ea96a4174bcc8e71854723281cfbc22d095ed9c9ca885a9c6d7c511efb5a208ad701ed8999f56be291c323da9646c4d0757dee4af35d59a70c3292732ce3b0c7add28828b9ccc1ff47d4d1d14da7df3ab3b65e9408"], 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x40000) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:59 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:59 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:59 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:59 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x0, 0x0) 22:14:59 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$KVM_SIGNAL_MSI(0xffffffffffffffff, 0x4020aea5, &(0x7f00000000c0)={0x7004, 0x3000, 0x8000002, 0x1}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:59 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:59 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) fcntl$setstatus(r0, 0x4, 0x44000) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r1, 0x400000000000001) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nr0\x00'}) 22:14:59 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, 0x0) 22:14:59 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:59 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:59 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) fcntl$setstatus(r0, 0x4, 0x44000) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r1, 0x400000000000001) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nr0\x00'}) 22:14:59 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080)={0x8}, 0x4) 22:14:59 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:59 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x0, 0x0) 22:14:59 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x11800, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:59 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffff9c, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00', 0xffffffffffffffff}, 0x30) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x8000, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0xfffffffffffff000, 0x0, 0x9, 0x4, 0x0, 0xe331, 0x8004, 0x1, 0x0, 0x4, 0x7f, 0x14959375, 0xa32, 0x5, 0xfffffffffffffff9, 0x7, 0x40, 0xa25, 0x0, 0x5, 0x9, 0x8, 0x3f, 0x7ff, 0xcc21, 0x9, 0x400, 0x7, 0x9, 0x0, 0x9, 0x7, 0xfffffffffffffffd, 0xfffffffffffffff9, 0x1a45c1c5, 0x0, 0x0, 0x1, 0x6, @perf_config_ext={0x401, 0x5}, 0x302, 0x80000001, 0x40, 0x0, 0x3, 0x100, 0x1000}, r0, 0xf, r1, 0x8) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:14:59 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) fcntl$setstatus(r0, 0x4, 0x44000) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r1, 0x400000000000001) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nr0\x00'}) 22:14:59 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, 0x0) 22:14:59 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:14:59 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xa5, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:59 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) fcntl$setstatus(r0, 0x4, 0x44000) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r1, 0x400000000000001) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'nr0\x00'}) 22:14:59 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, 0x0) 22:14:59 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1000, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:14:59 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x800, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bcsf0\x00\x00\x00\x00\'\a\xcaP\x00'}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') prctl$PR_SET_TSC(0x1a, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4004004}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x0, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x44800) socket$caif_stream(0x25, 0x1, 0x5) 22:15:00 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:15:00 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, 0x0) 22:15:00 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) fcntl$setstatus(r0, 0x4, 0x44000) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r1, 0x400000000000001) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) 22:15:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:00 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, 0x0) 22:15:00 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:15:00 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) fcntl$setstatus(r0, 0x4, 0x44000) r1 = socket$vsock_dgram(0x28, 0x2, 0x0) shutdown(r1, 0x400000000000001) 22:15:00 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000080)='tls\x00', 0x4) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'~ond_sdave_1\x00'}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f00000000c0)) 22:15:00 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) fcntl$setstatus(r0, 0x4, 0x44000) socket$vsock_dgram(0x28, 0x2, 0x0) 22:15:00 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:15:00 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, 0x0) 22:15:00 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x141a00, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000080)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@empty}}, &(0x7f0000000180)=0xe8) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x8000, 0x0) bind$xdp(r0, &(0x7f00000002c0)={0x2c, 0x1, r1, 0x17, r2}, 0x10) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:00 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffff9c, 0xf, 0xffffffffffffffff, 0x8) 22:15:00 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) fcntl$setstatus(r0, 0x4, 0x44000) 22:15:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:00 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x8) 22:15:00 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, 0x0) 22:15:00 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) 22:15:00 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) sched_getparam(r1, &(0x7f0000000080)) 22:15:00 executing program 2: getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) 22:15:00 executing program 1: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) 22:15:00 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, 0x0) 22:15:00 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20002a00}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000001e0000002dbd5c00fcdbdf053f99a26dce0174d896ea83ff6a2ad4426eb4677301a5a8f70000"], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x20000080) 22:15:00 executing program 2: getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) 22:15:00 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x800, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bcsf0\x00\x00\x00\x00\'\a\xcaP\x00'}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') prctl$PR_SET_TSC(0x1a, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4004004}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x0, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x44800) socket$caif_stream(0x25, 0x1, 0x5) 22:15:00 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:01 executing program 2: getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) 22:15:01 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffff97, 0x0, 0x0, 0x0, 0x0) 22:15:01 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x800, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bcsf0\x00\x00\x00\x00\'\a\xcaP\x00'}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') prctl$PR_SET_TSC(0x1a, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4004004}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x0, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x44800) socket$caif_stream(0x25, 0x1, 0x5) 22:15:01 executing program 2: socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) 22:15:01 executing program 0: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x721003) getsockname$netlink(r0, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 22:15:01 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0xa000, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e24}, 0x6e) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:01 executing program 2: socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) 22:15:01 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, 0x0) 22:15:01 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:01 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x800, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bcsf0\x00\x00\x00\x00\'\a\xcaP\x00'}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') prctl$PR_SET_TSC(0x1a, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4004004}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x0, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x44800) socket$caif_stream(0x25, 0x1, 0x5) 22:15:01 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, 0x0) 22:15:01 executing program 2: socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000080)=0x8) 22:15:01 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40000, 0x0) ioctl$TIOCSBRK(r0, 0x5427) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x2) 22:15:01 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, 0x0, &(0x7f0000000080)) 22:15:01 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x800, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bcsf0\x00\x00\x00\x00\'\a\xcaP\x00'}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') prctl$PR_SET_TSC(0x1a, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4004004}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x0, 0x70bd26, 0x25dfdbfc, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x44800) 22:15:01 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x230f0000, 0x0, 0x0, 0x0, 0x0) 22:15:01 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xf9', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:01 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, 0x0, 0x0) 22:15:01 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_DBG_S_REGISTER(r2, 0x4038564f, &(0x7f0000000180)={{0x3, @addr=0x8}, 0x8, 0x0, 0x6}) ioctl$KVM_CHECK_EXTENSION_VM(r2, 0xae03, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101200, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000080)={0x0, @initdev, @multicast2}, &(0x7f00000000c0)=0xc) sendmsg$xdp(r3, &(0x7f0000000240)={&(0x7f0000000100)={0x2c, 0x4, r4, 0x21}, 0x10, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x20000000}, 0x24048080) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000002c0)={0x0, 0x7fff, 0x30}, &(0x7f0000000300)=0xc) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r5, 0xffff}, &(0x7f00000001c0)=0x38) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000200)={0x0, 0x1}, &(0x7f0000000280)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={r6, 0x4d6}, &(0x7f00000003c0)=0x8) 22:15:01 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x800, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bcsf0\x00\x00\x00\x00\'\a\xcaP\x00'}) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') prctl$PR_SET_TSC(0x1a, 0x0) 22:15:01 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0) 22:15:01 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, 0x0, 0x0) 22:15:01 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, 0x0) 22:15:01 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x800, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bcsf0\x00\x00\x00\x00\'\a\xcaP\x00'}) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') 22:15:01 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, 0x0, 0x0) 22:15:01 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00'}, 0x10) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x5, &(0x7f0000000180)=[0xee00, 0xee00, 0xee00, 0x0, 0x0]) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={r1, r2, r3}, 0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:02 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xfc', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 271.139571][T15710] __ntfs_error: 142 callbacks suppressed [ 271.139584][T15710] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 271.180299][T15720] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 271.196434][T15710] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 22:15:02 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffff97, 0x0, 0x0, 0x0, 0x0) [ 271.227701][T15710] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. [ 271.239153][T15720] ntfs: (device loop3): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 22:15:02 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x800, 0x0) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'bcsf0\x00\x00\x00\x00\'\a\xcaP\x00'}) [ 271.299100][T15720] ntfs: (device loop3): ntfs_fill_super(): Not an NTFS volume. 22:15:02 executing program 0: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x100, 0x0) preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000100)=""/5, 0x5}, {&(0x7f0000000140)=""/34, 0x22}], 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') ioctl$IOC_PR_PREEMPT(r1, 0x401870cb, &(0x7f0000000080)={0x8, 0x200, 0x4, 0xffff}) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000001c0)={0x0, 0x5, 0x0, 0x4, 0x17, 0x5, 0x7, 0x100, 0x5, 0x800}) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000200)={'filter\x00'}, &(0x7f0000000280)=0x54) 22:15:02 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, 0x0) [ 271.392101][T15734] ntfs: (device loop2): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 271.412258][T15720] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 271.424567][T15734] ntfs: (device loop2): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 22:15:02 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xfd', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 271.458545][T15720] ntfs: (device loop3): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 22:15:02 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x102) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000140)=ANY=[@ANYBLOB="0200850041d7aab20f67822ea03aacdf410a578b72ebb9dfe4698d157662133f925bde6b85cfcb783d64a5ee8314bbce87c559ea1b1fde4dc1de9804494e87c28d6ea12b08ba2dbca66e1931eef75249f2a59ab18f096f8ac059f410cc5897ed95fad7815a563a6feae29b10e20fd2a26be8e1880fc7e70dd9ce6179409f647a566bf8389c5357b042"]) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$sock_ifreq(r0, 0x89b1, &(0x7f0000000000)={'ipddp0\x00', @ifru_map={0x400, 0x8, 0xc845, 0x8, 0x100000000, 0x8001}}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:02 executing program 1: socket$can_bcm(0x1d, 0x2, 0x2) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x800, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) 22:15:02 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, 0x0) 22:15:02 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, 0x0) 22:15:02 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, 0x0) 22:15:02 executing program 1: socket$can_bcm(0x1d, 0x2, 0x2) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000040)) 22:15:02 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'syz_tun\x00'}) 22:15:02 executing program 1: socket$can_bcm(0x1d, 0x2, 0x2) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000040)) 22:15:02 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'vcan0\x00'}) 22:15:02 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x7f', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:02 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xe000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:02 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/227) 22:15:02 executing program 1: socket$can_bcm(0x1d, 0x2, 0x2) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000040)) 22:15:02 executing program 0: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:03 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, 0x0) 22:15:03 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x800, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) 22:15:03 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/227) 22:15:03 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu\x00', 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) r4 = socket$kcm(0x29, 0x2, 0x0) sendfile(r4, r3, 0x0, 0x10001) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$assume_authority(0x10, r5) sendmmsg(r4, &(0x7f0000002dc0)=[{{&(0x7f0000001440)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000003c0), 0x3d8000}], 0x1}}], 0x1, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:15:03 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x40000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:03 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) 22:15:03 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/227) 22:15:03 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x8c', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:03 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)=0x135d) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$P9_RWRITE(r1, &(0x7f0000000040)={0xb, 0x77, 0x1, 0x6}, 0xb) 22:15:03 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/227) 22:15:03 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) 22:15:03 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) 22:15:03 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, 0x0) 22:15:03 executing program 2: ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000000)=""/227) 22:15:03 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, &(0x7f0000000040)) 22:15:03 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)=0x135d) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$P9_RWRITE(r1, &(0x7f0000000040)={0xb, 0x77, 0x1, 0x6}, 0xb) 22:15:03 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:03 executing program 1: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000040)) 22:15:03 executing program 2: ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000000)=""/227) 22:15:03 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xf6', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:03 executing program 2: ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000000)=""/227) 22:15:03 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x60000000, 0x0, 0x0, 0x0, 0x0) 22:15:03 executing program 1: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000040)) 22:15:03 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/227) 22:15:03 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:03 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)=0x135d) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) write$P9_RWRITE(r1, &(0x7f0000000040)={0xb, 0x77, 0x1, 0x6}, 0xb) 22:15:03 executing program 1: openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000040)) 22:15:03 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/227) 22:15:03 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/227) 22:15:03 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)=0x135d) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2) 22:15:04 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, 0x0) 22:15:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:04 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, 0x0) 22:15:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/227) 22:15:04 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, 0x0) 22:15:04 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:04 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)=0x135d) 22:15:04 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKROGET(r0, 0x125e, 0x0) 22:15:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000000)=""/227) 22:15:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:04 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, 0x0) 22:15:04 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:04 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)=0x135d) 22:15:04 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:04 executing program 2: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000000)=""/227) 22:15:04 executing program 0: ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)=0x135d) 22:15:04 executing program 0: ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)=0x135d) 22:15:04 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:04 executing program 2: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000000)=""/227) 22:15:04 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x113001, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f0000000140)={0x7b, 0x0, [0x8, 0x100000004, 0x1, 0x8c]}) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$evdev(r1, &(0x7f00000000c0)=[{{r2, r3/1000+10000}, 0x1f, 0xd6f, 0x7}], 0xfffffffffffffe86) 22:15:04 executing program 0: ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)=0x135d) 22:15:04 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)=0x135d) 22:15:04 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, 0x0) 22:15:04 executing program 2: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000000)=""/227) 22:15:04 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x1ede5) r2 = accept(r0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/240, 0xf0, 0x2001, &(0x7f0000000140)={0xa, 0x4e24, 0x100000001, @mcast2, 0x3ff}, 0x1c) shutdown(r2, 0x2) close(r2) r3 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0xec, r4, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nlmon0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80000000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1f}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe666}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9e4d}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xc07}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff60}]}, 0xec}, 0x1, 0x0, 0x0, 0x40044}, 0x80) write$evdev(r3, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:15:05 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:05 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)=0x135d) 22:15:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(r0, 0x80404508, 0x0) 22:15:05 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)=0x135d) 22:15:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x1ede5) r2 = accept(r0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/240, 0xf0, 0x2001, &(0x7f0000000140)={0xa, 0x4e24, 0x100000001, @mcast2, 0x3ff}, 0x1c) shutdown(r2, 0x2) close(r2) r3 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0xec, r4, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nlmon0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80000000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1f}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe666}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9e4d}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xc07}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff60}]}, 0xec}, 0x1, 0x0, 0x0, 0x40044}, 0x80) write$evdev(r3, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:15:05 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)=0x135d) 22:15:05 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, 0x0) 22:15:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:05 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x1ede5) r2 = accept(r0, 0x0, 0x0) recvfrom$inet6(r2, &(0x7f0000000040)=""/240, 0xf0, 0x2001, &(0x7f0000000140)={0xa, 0x4e24, 0x100000001, @mcast2, 0x3ff}, 0x1c) shutdown(r2, 0x2) close(r2) r3 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000300)={0xec, r4, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nlmon0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x80000000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1f}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe666}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9e4d}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xc07}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xffffffffffffff60}]}, 0xec}, 0x1, 0x0, 0x0, 0x40044}, 0x80) write$evdev(r3, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) 22:15:05 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:05 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)=0x135d) 22:15:05 executing program 1: gettid() r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) r2 = fcntl$getown(r0, 0x9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x10, 0x0, [0x81, 0x2000000000000000, 0xfb, 0x3, 0x1, 0x5, 0x20, 0x7, 0x4, 0xfffffffffffffffa, 0x10000, 0x10, 0xffff, 0x4, 0x5, 0x67]}, {0xf, 0x0, [0x10000, 0x9, 0x10000, 0x9, 0x1f, 0xfffffffffffff001, 0x9, 0x199, 0x5, 0x0, 0x2bef, 0x0, 0x1, 0x2, 0x2, 0x80]}, {0x4, 0x0, [0x6, 0x9, 0x3, 0x81, 0x1, 0x8000, 0x4, 0x5624, 0xfffffffeffffffff, 0x8, 0x2, 0x7, 0x7, 0x800, 0x2, 0x5]}, {0x20, 0x0, [0x5, 0x8, 0x53, 0x5, 0x6, 0x2, 0x1ff, 0x2f, 0x100, 0xffffffff, 0x2, 0x7f, 0x3, 0x20, 0x100]}, {0x28, 0x0, [0x5, 0xb3, 0xffffffffffffcc27, 0x8, 0x480000000000, 0x9, 0x18000000, 0xfff, 0x5, 0x8, 0xffffffffb2bd0680, 0xdc, 0x7f, 0x81, 0x68c2, 0xffff]}, {0x14, 0x0, [0x7, 0x7, 0x400, 0x5, 0x4, 0x0, 0x5, 0xff, 0x1, 0x5, 0x5, 0x2, 0x1400000000, 0x5, 0x4, 0x7]}], r1, 0x1, 0x1, 0x1b0}}, 0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x800, 0x0) r4 = semget(0x0, 0x1, 0x203) clock_gettime(0x7, &(0x7f00000004c0)) semtimedop(r4, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000340), &(0x7f0000000380)=0x4) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0xffffffff, &(0x7f00000003c0)=""/63) write$binfmt_aout(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="cf0142ffcf0200008f0200000600000026030000010400000000000000000000483379d7e8da81593b13bdef8b4832875ac494fd99b0abbbeee45bb3893c3fa3be41600295977cf759311fb3cb37d1bf2e1bbffe71aaf9e76a37e0f06dfd9771a4bf3962d78daafb30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000"/1641], 0x669) 22:15:05 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:05 executing program 0: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)=0x135d) 22:15:05 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, 0x0) 22:15:05 executing program 1: gettid() r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) r2 = fcntl$getown(r0, 0x9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x10, 0x0, [0x81, 0x2000000000000000, 0xfb, 0x3, 0x1, 0x5, 0x20, 0x7, 0x4, 0xfffffffffffffffa, 0x10000, 0x10, 0xffff, 0x4, 0x5, 0x67]}, {0xf, 0x0, [0x10000, 0x9, 0x10000, 0x9, 0x1f, 0xfffffffffffff001, 0x9, 0x199, 0x5, 0x0, 0x2bef, 0x0, 0x1, 0x2, 0x2, 0x80]}, {0x4, 0x0, [0x6, 0x9, 0x3, 0x81, 0x1, 0x8000, 0x4, 0x5624, 0xfffffffeffffffff, 0x8, 0x2, 0x7, 0x7, 0x800, 0x2, 0x5]}, {0x20, 0x0, [0x5, 0x8, 0x53, 0x5, 0x6, 0x2, 0x1ff, 0x2f, 0x100, 0xffffffff, 0x2, 0x7f, 0x3, 0x20, 0x100]}, {0x28, 0x0, [0x5, 0xb3, 0xffffffffffffcc27, 0x8, 0x480000000000, 0x9, 0x18000000, 0xfff, 0x5, 0x8, 0xffffffffb2bd0680, 0xdc, 0x7f, 0x81, 0x68c2, 0xffff]}, {0x14, 0x0, [0x7, 0x7, 0x400, 0x5, 0x4, 0x0, 0x5, 0xff, 0x1, 0x5, 0x5, 0x2, 0x1400000000, 0x5, 0x4, 0x7]}], r1, 0x1, 0x1, 0x1b0}}, 0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x800, 0x0) r4 = semget(0x0, 0x1, 0x203) clock_gettime(0x7, &(0x7f00000004c0)) semtimedop(r4, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000340), &(0x7f0000000380)=0x4) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0xffffffff, &(0x7f00000003c0)=""/63) write$binfmt_aout(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/1641], 0x669) 22:15:06 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:06 executing program 0: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)=0x135d) 22:15:06 executing program 1: gettid() r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) r2 = fcntl$getown(r0, 0x9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x10, 0x0, [0x81, 0x2000000000000000, 0xfb, 0x3, 0x1, 0x5, 0x20, 0x7, 0x4, 0xfffffffffffffffa, 0x10000, 0x10, 0xffff, 0x4, 0x5, 0x67]}, {0xf, 0x0, [0x10000, 0x9, 0x10000, 0x9, 0x1f, 0xfffffffffffff001, 0x9, 0x199, 0x5, 0x0, 0x2bef, 0x0, 0x1, 0x2, 0x2, 0x80]}, {0x4, 0x0, [0x6, 0x9, 0x3, 0x81, 0x1, 0x8000, 0x4, 0x5624, 0xfffffffeffffffff, 0x8, 0x2, 0x7, 0x7, 0x800, 0x2, 0x5]}, {0x20, 0x0, [0x5, 0x8, 0x53, 0x5, 0x6, 0x2, 0x1ff, 0x2f, 0x100, 0xffffffff, 0x2, 0x7f, 0x3, 0x20, 0x100]}, {0x28, 0x0, [0x5, 0xb3, 0xffffffffffffcc27, 0x8, 0x480000000000, 0x9, 0x18000000, 0xfff, 0x5, 0x8, 0xffffffffb2bd0680, 0xdc, 0x7f, 0x81, 0x68c2, 0xffff]}, {0x14, 0x0, [0x7, 0x7, 0x400, 0x5, 0x4, 0x0, 0x5, 0xff, 0x1, 0x5, 0x5, 0x2, 0x1400000000, 0x5, 0x4, 0x7]}], r1, 0x1, 0x1, 0x1b0}}, 0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x800, 0x0) r4 = semget(0x0, 0x1, 0x203) clock_gettime(0x7, &(0x7f00000004c0)) semtimedop(r4, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000340), &(0x7f0000000380)=0x4) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0xffffffff, &(0x7f00000003c0)=""/63) write$binfmt_aout(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/1641], 0x669) 22:15:06 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x97ffffff, 0x0, 0x0, 0x0, 0x0) 22:15:06 executing program 0: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)=0x135d) 22:15:06 executing program 1: gettid() r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) r2 = fcntl$getown(r0, 0x9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x10, 0x0, [0x81, 0x2000000000000000, 0xfb, 0x3, 0x1, 0x5, 0x20, 0x7, 0x4, 0xfffffffffffffffa, 0x10000, 0x10, 0xffff, 0x4, 0x5, 0x67]}, {0xf, 0x0, [0x10000, 0x9, 0x10000, 0x9, 0x1f, 0xfffffffffffff001, 0x9, 0x199, 0x5, 0x0, 0x2bef, 0x0, 0x1, 0x2, 0x2, 0x80]}, {0x4, 0x0, [0x6, 0x9, 0x3, 0x81, 0x1, 0x8000, 0x4, 0x5624, 0xfffffffeffffffff, 0x8, 0x2, 0x7, 0x7, 0x800, 0x2, 0x5]}, {0x20, 0x0, [0x5, 0x8, 0x53, 0x5, 0x6, 0x2, 0x1ff, 0x2f, 0x100, 0xffffffff, 0x2, 0x7f, 0x3, 0x20, 0x100]}, {0x28, 0x0, [0x5, 0xb3, 0xffffffffffffcc27, 0x8, 0x480000000000, 0x9, 0x18000000, 0xfff, 0x5, 0x8, 0xffffffffb2bd0680, 0xdc, 0x7f, 0x81, 0x68c2, 0xffff]}, {0x14, 0x0, [0x7, 0x7, 0x400, 0x5, 0x4, 0x0, 0x5, 0xff, 0x1, 0x5, 0x5, 0x2, 0x1400000000, 0x5, 0x4, 0x7]}], r1, 0x1, 0x1, 0x1b0}}, 0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x800, 0x0) r4 = semget(0x0, 0x1, 0x203) clock_gettime(0x7, &(0x7f00000004c0)) semtimedop(r4, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000340), &(0x7f0000000380)=0x4) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0xffffffff, &(0x7f00000003c0)=""/63) 22:15:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:06 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:06 executing program 1: gettid() r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) fcntl$getown(r0, 0x9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x10, 0x0, [0x81, 0x2000000000000000, 0xfb, 0x3, 0x1, 0x5, 0x20, 0x7, 0x4, 0xfffffffffffffffa, 0x10000, 0x10, 0xffff, 0x4, 0x5, 0x67]}, {0xf, 0x0, [0x10000, 0x9, 0x10000, 0x9, 0x1f, 0xfffffffffffff001, 0x9, 0x199, 0x5, 0x0, 0x2bef, 0x0, 0x1, 0x2, 0x2, 0x80]}, {0x4, 0x0, [0x6, 0x9, 0x3, 0x81, 0x1, 0x8000, 0x4, 0x5624, 0xfffffffeffffffff, 0x8, 0x2, 0x7, 0x7, 0x800, 0x2, 0x5]}, {0x20, 0x0, [0x5, 0x8, 0x53, 0x5, 0x6, 0x2, 0x1ff, 0x2f, 0x100, 0xffffffff, 0x2, 0x7f, 0x3, 0x20, 0x100]}, {0x28, 0x0, [0x5, 0xb3, 0xffffffffffffcc27, 0x8, 0x480000000000, 0x9, 0x18000000, 0xfff, 0x5, 0x8, 0xffffffffb2bd0680, 0xdc, 0x7f, 0x81, 0x68c2, 0xffff]}, {0x14, 0x0, [0x7, 0x7, 0x400, 0x5, 0x4, 0x0, 0x5, 0xff, 0x1, 0x5, 0x5, 0x2, 0x1400000000, 0x5, 0x4, 0x7]}], r1, 0x1, 0x1, 0x1b0}}, 0x20) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x800, 0x0) r3 = semget(0x0, 0x1, 0x203) clock_gettime(0x7, &(0x7f00000004c0)) semtimedop(r3, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000340), &(0x7f0000000380)=0x4) 22:15:06 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 22:15:06 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, 0x0) 22:15:06 executing program 1: gettid() r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) fcntl$getown(r0, 0x9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x10, 0x0, [0x81, 0x2000000000000000, 0xfb, 0x3, 0x1, 0x5, 0x20, 0x7, 0x4, 0xfffffffffffffffa, 0x10000, 0x10, 0xffff, 0x4, 0x5, 0x67]}, {0xf, 0x0, [0x10000, 0x9, 0x10000, 0x9, 0x1f, 0xfffffffffffff001, 0x9, 0x199, 0x5, 0x0, 0x2bef, 0x0, 0x1, 0x2, 0x2, 0x80]}, {0x4, 0x0, [0x6, 0x9, 0x3, 0x81, 0x1, 0x8000, 0x4, 0x5624, 0xfffffffeffffffff, 0x8, 0x2, 0x7, 0x7, 0x800, 0x2, 0x5]}, {0x20, 0x0, [0x5, 0x8, 0x53, 0x5, 0x6, 0x2, 0x1ff, 0x2f, 0x100, 0xffffffff, 0x2, 0x7f, 0x3, 0x20, 0x100]}, {0x28, 0x0, [0x5, 0xb3, 0xffffffffffffcc27, 0x8, 0x480000000000, 0x9, 0x18000000, 0xfff, 0x5, 0x8, 0xffffffffb2bd0680, 0xdc, 0x7f, 0x81, 0x68c2, 0xffff]}, {0x14, 0x0, [0x7, 0x7, 0x400, 0x5, 0x4, 0x0, 0x5, 0xff, 0x1, 0x5, 0x5, 0x2, 0x1400000000, 0x5, 0x4, 0x7]}], r1, 0x1, 0x1, 0x1b0}}, 0x20) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x800, 0x0) r2 = semget(0x0, 0x1, 0x203) clock_gettime(0x7, &(0x7f00000004c0)) semtimedop(r2, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) 22:15:06 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:06 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 22:15:06 executing program 1: gettid() r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) fcntl$getown(r0, 0x9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x10, 0x0, [0x81, 0x2000000000000000, 0xfb, 0x3, 0x1, 0x5, 0x20, 0x7, 0x4, 0xfffffffffffffffa, 0x10000, 0x10, 0xffff, 0x4, 0x5, 0x67]}, {0xf, 0x0, [0x10000, 0x9, 0x10000, 0x9, 0x1f, 0xfffffffffffff001, 0x9, 0x199, 0x5, 0x0, 0x2bef, 0x0, 0x1, 0x2, 0x2, 0x80]}, {0x4, 0x0, [0x6, 0x9, 0x3, 0x81, 0x1, 0x8000, 0x4, 0x5624, 0xfffffffeffffffff, 0x8, 0x2, 0x7, 0x7, 0x800, 0x2, 0x5]}, {0x20, 0x0, [0x5, 0x8, 0x53, 0x5, 0x6, 0x2, 0x1ff, 0x2f, 0x100, 0xffffffff, 0x2, 0x7f, 0x3, 0x20, 0x100]}, {0x28, 0x0, [0x5, 0xb3, 0xffffffffffffcc27, 0x8, 0x480000000000, 0x9, 0x18000000, 0xfff, 0x5, 0x8, 0xffffffffb2bd0680, 0xdc, 0x7f, 0x81, 0x68c2, 0xffff]}, {0x14, 0x0, [0x7, 0x7, 0x400, 0x5, 0x4, 0x0, 0x5, 0xff, 0x1, 0x5, 0x5, 0x2, 0x1400000000, 0x5, 0x4, 0x7]}], r1, 0x1, 0x1, 0x1b0}}, 0x20) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x800, 0x0) r2 = semget(0x0, 0x1, 0x203) semtimedop(r2, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) 22:15:06 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:06 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, 0x0) 22:15:06 executing program 1: gettid() r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) fcntl$getown(r0, 0x9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x10, 0x0, [0x81, 0x2000000000000000, 0xfb, 0x3, 0x1, 0x5, 0x20, 0x7, 0x4, 0xfffffffffffffffa, 0x10000, 0x10, 0xffff, 0x4, 0x5, 0x67]}, {0xf, 0x0, [0x10000, 0x9, 0x10000, 0x9, 0x1f, 0xfffffffffffff001, 0x9, 0x199, 0x5, 0x0, 0x2bef, 0x0, 0x1, 0x2, 0x2, 0x80]}, {0x4, 0x0, [0x6, 0x9, 0x3, 0x81, 0x1, 0x8000, 0x4, 0x5624, 0xfffffffeffffffff, 0x8, 0x2, 0x7, 0x7, 0x800, 0x2, 0x5]}, {0x20, 0x0, [0x5, 0x8, 0x53, 0x5, 0x6, 0x2, 0x1ff, 0x2f, 0x100, 0xffffffff, 0x2, 0x7f, 0x3, 0x20, 0x100]}, {0x28, 0x0, [0x5, 0xb3, 0xffffffffffffcc27, 0x8, 0x480000000000, 0x9, 0x18000000, 0xfff, 0x5, 0x8, 0xffffffffb2bd0680, 0xdc, 0x7f, 0x81, 0x68c2, 0xffff]}, {0x14, 0x0, [0x7, 0x7, 0x400, 0x5, 0x4, 0x0, 0x5, 0xff, 0x1, 0x5, 0x5, 0x2, 0x1400000000, 0x5, 0x4, 0x7]}], r1, 0x1, 0x1, 0x1b0}}, 0x20) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x800, 0x0) semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) 22:15:06 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) 22:15:07 executing program 1: gettid() r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) fcntl$getown(r0, 0x9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x10, 0x0, [0x81, 0x2000000000000000, 0xfb, 0x3, 0x1, 0x5, 0x20, 0x7, 0x4, 0xfffffffffffffffa, 0x10000, 0x10, 0xffff, 0x4, 0x5, 0x67]}, {0xf, 0x0, [0x10000, 0x9, 0x10000, 0x9, 0x1f, 0xfffffffffffff001, 0x9, 0x199, 0x5, 0x0, 0x2bef, 0x0, 0x1, 0x2, 0x2, 0x80]}, {0x4, 0x0, [0x6, 0x9, 0x3, 0x81, 0x1, 0x8000, 0x4, 0x5624, 0xfffffffeffffffff, 0x8, 0x2, 0x7, 0x7, 0x800, 0x2, 0x5]}, {0x20, 0x0, [0x5, 0x8, 0x53, 0x5, 0x6, 0x2, 0x1ff, 0x2f, 0x100, 0xffffffff, 0x2, 0x7f, 0x3, 0x20, 0x100]}, {0x28, 0x0, [0x5, 0xb3, 0xffffffffffffcc27, 0x8, 0x480000000000, 0x9, 0x18000000, 0xfff, 0x5, 0x8, 0xffffffffb2bd0680, 0xdc, 0x7f, 0x81, 0x68c2, 0xffff]}, {0x14, 0x0, [0x7, 0x7, 0x400, 0x5, 0x4, 0x0, 0x5, 0xff, 0x1, 0x5, 0x5, 0x2, 0x1400000000, 0x5, 0x4, 0x7]}], r1, 0x1, 0x1, 0x1b0}}, 0x20) semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) 22:15:07 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)) 22:15:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:07 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, 0x0) [ 276.207295][T16050] __ntfs_error: 146 callbacks suppressed [ 276.207308][T16050] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 276.279255][T16050] ntfs: (device loop3): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 276.292256][T16050] ntfs: (device loop3): ntfs_fill_super(): Not an NTFS volume. 22:15:07 executing program 1: gettid() r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0xd}}, 0x20) fcntl$getown(r0, 0x9) semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) [ 276.358426][T16056] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 276.382500][T16060] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 276.391793][T16060] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 276.428733][T16060] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. [ 276.463120][T16050] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. 22:15:07 executing program 1: gettid() r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0), 0x13f, 0xd}}, 0x20) semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) [ 276.472404][T16050] ntfs: (device loop3): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 276.485670][T16050] ntfs: (device loop3): ntfs_fill_super(): Not an NTFS volume. 22:15:07 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xf9fdffff, 0x0, 0x0, 0x0, 0x0) 22:15:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:07 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:07 executing program 1: gettid() r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) 22:15:07 executing program 1: gettid() syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) 22:15:07 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x0, 0x0) 22:15:07 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:07 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x230f000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:07 executing program 1: gettid() semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) 22:15:07 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) 22:15:07 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, 0x0) 22:15:08 executing program 1: semtimedop(0x0, 0x0, 0x0, &(0x7f0000000480)) 22:15:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:08 executing program 1: semtimedop(0x0, 0x0, 0x0, &(0x7f0000000480)) 22:15:08 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:08 executing program 1: semtimedop(0x0, 0x0, 0x0, &(0x7f0000000480)) 22:15:08 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfdffffff, 0x0, 0x0, 0x0, 0x0) 22:15:08 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}], 0x2, &(0x7f0000000480)) 22:15:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:08 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}], 0x2, &(0x7f0000000480)) 22:15:08 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:08 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffdf9, 0x0, 0x0, 0x0, 0x0) 22:15:08 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}], 0x2, &(0x7f0000000480)) 22:15:08 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x0, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) 22:15:08 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:08 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x0, 0x0, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) 22:15:08 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:08 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x0, 0x0) 22:15:09 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) 22:15:09 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {}], 0x2, &(0x7f0000000480)) 22:15:09 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:09 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {}], 0x2, &(0x7f0000000480)) 22:15:09 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {}], 0x2, &(0x7f0000000480)) 22:15:09 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:09 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{}], 0x1, &(0x7f0000000480)) 22:15:09 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, 0x0) 22:15:09 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{}], 0x1, &(0x7f0000000480)) 22:15:09 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:09 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{}], 0x1, &(0x7f0000000480)) 22:15:09 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x0, 0x1000}, {}], 0x2, &(0x7f0000000480)) 22:15:09 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:09 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x0, 0x1000}, {}], 0x2, &(0x7f0000000480)) 22:15:09 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:09 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffff7f, 0x0, 0x0, 0x0, 0x0) 22:15:09 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x0, 0x1000}, {}], 0x2, &(0x7f0000000480)) 22:15:10 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, 0x0) 22:15:10 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:10 executing program 0: gettid() r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0xd}}, 0x20) r2 = fcntl$getown(r0, 0x9) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000240)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000000)=[{0x10, 0x0, [0x81, 0x2000000000000000, 0xfb, 0x3, 0x1, 0x5, 0x20, 0x7, 0x4, 0xfffffffffffffffa, 0x10000, 0x10, 0xffff, 0x4, 0x5, 0x67]}, {0xf, 0x0, [0x10000, 0x9, 0x10000, 0x9, 0x1f, 0xfffffffffffff001, 0x9, 0x199, 0x5, 0x0, 0x2bef, 0x0, 0x1, 0x2, 0x2, 0x80]}, {0x4, 0x0, [0x6, 0x9, 0x3, 0x81, 0x1, 0x8000, 0x4, 0x5624, 0xfffffffeffffffff, 0x8, 0x2, 0x7, 0x7, 0x800, 0x2, 0x5]}, {0x20, 0x0, [0x5, 0x8, 0x53, 0x5, 0x6, 0x2, 0x1ff, 0x2f, 0x100, 0xffffffff, 0x2, 0x7f, 0x3, 0x20, 0x100]}, {0x28, 0x0, [0x5, 0xb3, 0xffffffffffffcc27, 0x8, 0x480000000000, 0x9, 0x18000000, 0xfff, 0x5, 0x8, 0xffffffffb2bd0680, 0xdc, 0x7f, 0x81, 0x68c2, 0xffff]}, {0x14, 0x0, [0x7, 0x7, 0x400, 0x5, 0x4, 0x0, 0x5, 0xff, 0x1, 0x5, 0x5, 0x2, 0x1400000000, 0x5, 0x4, 0x7]}], r1, 0x1, 0x1, 0x1b0}}, 0x20) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x800, 0x0) r4 = semget(0x0, 0x1, 0x203) clock_gettime(0x7, &(0x7f00000004c0)) semtimedop(r4, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {0x1, 0xff69, 0x1000}, {0x3, 0x80, 0x1800}], 0x2aaaaaaaaaaaae91, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000340), &(0x7f0000000380)=0x4) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0xffffffff, &(0x7f00000003c0)=""/63) 22:15:10 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000}, {}], 0x2, &(0x7f0000000480)) 22:15:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000000, 0x28001) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, 0x7, 0x5, 0x51, &(0x7f0000ffc000/0x3000)=nil, 0x5017}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:10 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000000, 0x28001) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, 0x7, 0x5, 0x51, &(0x7f0000ffc000/0x3000)=nil, 0x5017}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:10 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000}, {}], 0x2, &(0x7f0000000480)) 22:15:10 executing program 2: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000}, {}], 0x2, &(0x7f0000000480)) 22:15:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000000, 0x28001) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, 0x7, 0x5, 0x51, &(0x7f0000ffc000/0x3000)=nil, 0x5017}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$sock_rose_SIOCRSCLRRT(0xffffffffffffffff, 0x89e4) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:10 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffff97, 0x0, 0x0, 0x0, 0x0) 22:15:10 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000}, {}], 0x2, &(0x7f0000000480)) 22:15:10 executing program 2: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000}, {}], 0x2, &(0x7f0000000480)) 22:15:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000000, 0x28001) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, 0x7, 0x5, 0x51, &(0x7f0000ffc000/0x3000)=nil, 0x5017}) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:10 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {}], 0x2, 0x0) 22:15:10 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:10 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {}], 0x2, 0x0) 22:15:10 executing program 2: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000}, {}], 0x2, &(0x7f0000000480)) 22:15:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000000, 0x28001) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x800) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000480)={&(0x7f0000ffc000/0x3000)=nil, 0x7, 0x5, 0x51, &(0x7f0000ffc000/0x3000)=nil, 0x5017}) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:10 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, 0x0) 22:15:10 executing program 1: semtimedop(0x0, &(0x7f0000000400)=[{0x0, 0x80000000, 0x1000}, {}], 0x2, 0x0) 22:15:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000000, 0x28001) pipe2(&(0x7f0000000440), 0x800) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:10 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="18262543c82bcd15d05f9c7c0ffb49b32a594ed1253529b3aae9f636334941f92c3d15ee767282d4d2863988d05e49033a02f6b1ba1992cf6ca1c95efc58ec7617c5bd4801592d845f7f8df2578bbe9beb26d6b3ca1e008afbc3b5c2bf2e98fa83dc99243977bfdb5f692a829bdf05e11c5c42d02147d879871fb7083a9f4b76e9a9cb80823e99e2df11825ffd0a3d8a235bc88ed9e2204ec48a871af55e7ba031ee193e75e66378475e87e31bc97df6481d7d15e000dffc3c6c3624bb385f9b9c1688657aaf3af865102ef619eca1d09258afbc417903c334fdd2b77e5a601d6895fe95e7e64b6b6ab61f67caa89b71bff94912e751dbba", 0xf8, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$unlink(0x9, r1, r2) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r3, 0x408c563e, &(0x7f0000000300)={0x2, 0xe, 0x2e, "3d3bbdf4983dfeeb63c754b8b6f6fb57d47ad346551822cc8b50a5a611bd7a9f3f9b8af4508d10d42cbf283b8dbb2d8d687a51320d48d75ef1b28869", 0x2a, "7f66ff5a33f1f5defcbad844b86ba189e7ca5fab19715ad37bda570a4e6c0449c92cea81749ef5b7f79f7e50514d29d5c9a69aadb8eb68ceb0940e29", 0x20}) 22:15:10 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x18) write(r0, &(0x7f0000000000)="cd69ef6533b0b9ebc50d9df398a932968bd6c5750bce2aa5b66f3335e058dd746543ab64669d4fe57fe2c08578b5fced9f3377bb04ec2fa4cb6c8a9d1449d57a9f98d04e7eb40f4b8ddc5d011e7e750378b772e91fa01206d26cd53b18d0353d1987c068d48a716b2812f9d15c831d3849d8b9fd51b04a9846b75fb6d0cea3b7311426083d229b25586eaadf87693f1290ba2dbca31b0437f6ef6ba59383d461efd9682036fd0388f04621d78b38118f4ca5fe255d0b2552cc321eb878c1ff9c774557622396d2f8680abab71f93adbd1c9b018a83e06e2ab464ac", 0xdb) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000140)=[{{0x0, 0x2710}, 0x14, 0xfffffffffffff95e, 0x80000000}, {{0x77359400}, 0x15, 0x7}, {{0x77359400}, 0x11, 0x1, 0x800}, {{}, 0x15, 0xffff, 0xfffffffffffffff7}, {{0x0, 0x7530}, 0x17, 0x10001, 0xa1af}, {{}, 0x12, 0x5, 0x28000000000}, {{r1, r2/1000+30000}, 0x15, 0x5, 0x5}, {{}, 0x4, 0x2, 0x9}], 0xc0) 22:15:10 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:10 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000000, 0x28001) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:11 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:11 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfffffffd, 0x0, 0x0, 0x0, 0x0) 22:15:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x8) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000200)={r1, 0x3}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x4}, &(0x7f0000000100)=0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x4000, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000240), &(0x7f0000000300)=0x4) 22:15:11 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r2, r3+30000000}, &(0x7f0000000200)) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x1, 0x200000) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000000c0)={0x9b, 0x5, 0x0, 0x3, 0xcbb, 0x100}) 22:15:11 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) [ 280.316340][T16282] QAT: Invalid ioctl 22:15:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x8) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000200)={r1, 0x3}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x4}, &(0x7f0000000100)=0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x4000, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000240), &(0x7f0000000300)=0x4) 22:15:11 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:11 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:11 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, 0x0) 22:15:11 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:11 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000000, 0x0, 0x0, 0x0, 0x0) 22:15:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x8) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000200)={r1, 0x3}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x4}, &(0x7f0000000100)=0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x4000, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000240), &(0x7f0000000300)=0x4) 22:15:11 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:11 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x80000000, 0x28001) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:11 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x8) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000200)={r1, 0x3}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x4}, &(0x7f0000000100)=0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x4000, 0x0) 22:15:12 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r2, r3+30000000}, &(0x7f0000000200)) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x1, 0x200000) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000000c0)={0x9b, 0x5, 0x0, 0x3, 0xcbb, 0x100}) 22:15:12 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x80000000, 0x28001) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:12 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, 0x0) 22:15:12 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x8) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) ioctl$VIDIOC_QUERYCTRL(r1, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000200)={r1, 0x3}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={r2, 0x4}, &(0x7f0000000100)=0x8) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) 22:15:12 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x97ffffff00000000, 0x0, 0x0, 0x0, 0x0) 22:15:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 281.263121][T16322] __ntfs_error: 160 callbacks suppressed [ 281.263132][T16322] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:15:12 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x80000000, 0x28001) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:12 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x8) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000200)={r0, 0x3}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000000c0)={r1, 0x4}, &(0x7f0000000100)=0x8) [ 281.305003][T16325] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 281.307469][T16331] QAT: Invalid ioctl [ 281.320565][T16326] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 281.338187][T16325] ntfs: (device loop5): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 281.353231][T16326] ntfs: (device loop3): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 281.355689][T16325] ntfs: (device loop5): ntfs_fill_super(): Not an NTFS volume. 22:15:12 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x28001) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) [ 281.396103][T16322] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 281.405925][T16326] ntfs: (device loop3): ntfs_fill_super(): Not an NTFS volume. 22:15:12 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x8) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000200)={r0, 0x3}) 22:15:12 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0) 22:15:12 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 281.659014][T16344] ntfs: (device loop5): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 281.682543][T16347] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:15:13 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r2, r3+30000000}, &(0x7f0000000200)) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x1, 0x200000) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f00000000c0)={0x9b, 0x5, 0x0, 0x3, 0xcbb, 0x100}) 22:15:13 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xe000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:13 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x8) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x400}, &(0x7f0000000080)=0x8) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) 22:15:13 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x28001) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:13 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, 0x0) [ 282.226200][T16365] QAT: Invalid ioctl 22:15:13 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x8) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) 22:15:13 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x28001) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:13 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x8) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) 22:15:13 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x0, 0x0) 22:15:13 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:13 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r2, r3+30000000}, &(0x7f0000000200)) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x1, 0x200000) 22:15:13 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000000, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:13 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x8) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) 22:15:13 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:13 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, 0x0) 22:15:13 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:14 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000000, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) [ 283.198932][T16401] QAT: Invalid ioctl 22:15:14 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) socket$inet_dccp(0x2, 0x6, 0x0) eventfd(0x8) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) 22:15:14 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:14 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:14 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000000, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:14 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) socket$inet_dccp(0x2, 0x6, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) 22:15:14 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r2, r3+30000000}, &(0x7f0000000200)) 22:15:14 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x0, 0x0) 22:15:14 executing program 0: syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000000, 0x28001) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:14 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) 22:15:14 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:14 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:15 executing program 0: syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000000, 0x28001) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) [ 284.142325][T16433] QAT: Invalid ioctl 22:15:15 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) 22:15:15 executing program 0: syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000000, 0x28001) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000000)=""/107, 0x6b}, {&(0x7f0000000080)=""/39, 0x27}, {&(0x7f00000000c0)=""/4, 0x4}, {&(0x7f0000000100)=""/89, 0x59}, {&(0x7f0000000180)=""/84, 0x54}, {&(0x7f0000000300)=""/195, 0xc3}], 0x6, 0x0) 22:15:15 executing program 1: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) 22:15:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:15 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:15 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)) 22:15:15 executing program 1: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) 22:15:15 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x80000000, 0x28001) preadv(r0, 0x0, 0x0, 0x0) 22:15:15 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0) 22:15:15 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:15 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:16 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r2, r3+30000000}, &(0x7f0000000200)) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x1, 0x200000) 22:15:16 executing program 1: r0 = syz_open_dev$swradio(0x0, 0x0, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) [ 285.131597][T16468] QAT: Invalid ioctl 22:15:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) 22:15:16 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) [ 285.290186][T16476] QAT: Invalid ioctl [ 285.299762][T16475] QAT: Invalid ioctl 22:15:16 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) 22:15:16 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:16 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0) 22:15:16 executing program 1: syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) 22:15:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) 22:15:16 executing program 1: syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) 22:15:16 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:17 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r2, r3+30000000}, &(0x7f0000000200)) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x1, 0x200000) 22:15:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:17 executing program 1: syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCTRL(0xffffffffffffffff, 0xc0445624, &(0x7f0000000180)={0x3, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) 22:15:17 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xa00000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:17 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:17 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 22:15:17 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, 0x0) 22:15:17 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) [ 286.216658][T16510] QAT: Invalid ioctl 22:15:17 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, 0x0) [ 286.332548][T16512] __ntfs_error: 104 callbacks suppressed [ 286.332559][T16512] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 286.338252][T16512] ntfs: (device loop3): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 286.338262][T16512] ntfs: (device loop3): ntfs_fill_super(): Not an NTFS volume. [ 286.370571][T16514] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:15:17 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1f00000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:17 executing program 2: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:17 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, 0x0, 0x0, 0x0) [ 286.732485][T16533] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 286.741755][T16533] ntfs: (device loop3): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 286.741766][T16533] ntfs: (device loop3): ntfs_fill_super(): Not an NTFS volume. [ 286.786843][T16533] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 286.803178][T16533] ntfs: (device loop3): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 286.817691][T16533] ntfs: (device loop3): ntfs_fill_super(): Not an NTFS volume. 22:15:17 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r2, r3+30000000}, &(0x7f0000000200)) syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x1, 0x200000) 22:15:17 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:17 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, 0x0) 22:15:17 executing program 2: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:17 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3, 0x0, 0x0, 0x0) 22:15:17 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:18 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, 0x0, 0x0, 0x0) 22:15:18 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x0, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x80000000, 0x1, 0xcbb2, 0x138}) 22:15:18 executing program 2: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:18 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) [ 287.254037][T16556] QAT: Invalid ioctl 22:15:18 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, 0x0, 0x0, 0x0) 22:15:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\xff', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:18 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r2, r3+30000000}, &(0x7f0000000200)) 22:15:18 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x0, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x0, 0x1, 0xcbb2, 0x138}) 22:15:18 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:18 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:18 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6, 0x0, 0x0, 0x0) 22:15:18 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) 22:15:19 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7, 0x0, 0x0, 0x0) 22:15:19 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:19 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x0, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x0, 0x0, 0xcbb2, 0x138}) [ 288.203151][T16582] QAT: Invalid ioctl 22:15:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0x0, 0x0, 0x0, 0x0) 22:15:19 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa, 0x0, 0x0, 0x0) 22:15:19 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28001) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:19 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)) 22:15:19 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x0, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d", 0x0, 0x0, 0x0, 0x0, 0x138}) 22:15:19 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x230f000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:19 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe, 0x0, 0x0, 0x0) 22:15:19 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:19 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) 22:15:20 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000180)={0x0, 0x0, "29cbf7e6cff23ed59d8f4eb2cf63cdfceccf7dd37072836db813f41bd324325d"}) 22:15:20 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x10, 0x0, 0x0, 0x0) [ 289.157700][T16611] QAT: Invalid ioctl 22:15:20 executing program 2: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) 22:15:20 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r2, r3+30000000}, &(0x7f0000000200)) 22:15:20 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x48, 0x0, 0x0, 0x0) 22:15:20 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x5, 0x0, 0x0, 0x0, 0x0) [ 289.352543][T16620] QAT: Invalid ioctl 22:15:20 executing program 2: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) [ 289.403443][T16622] QAT: Invalid ioctl 22:15:20 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, 0x0) 22:15:20 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) 22:15:20 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x68, 0x0, 0x0, 0x0) 22:15:20 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6, 0x0, 0x0, 0x0, 0x0) 22:15:20 executing program 2: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:20 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, 0x0) 22:15:20 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4000000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:21 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r2, r3+30000000}, &(0x7f0000000200)) 22:15:21 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) 22:15:21 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x74, 0x0, 0x0, 0x0) 22:15:21 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7, 0x0, 0x0, 0x0, 0x0) 22:15:21 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, 0x0) 22:15:21 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4800000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:21 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, 0x0) [ 290.330834][T16665] QAT: Invalid ioctl 22:15:21 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:21 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, 0x0) 22:15:21 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x300, 0x0, 0x0, 0x0) 22:15:21 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xa, 0x0, 0x0, 0x0, 0x0) 22:15:21 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:22 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) nanosleep(&(0x7f00000001c0)={r2, r3+30000000}, &(0x7f0000000200)) 22:15:22 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4c00000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:22 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x500, 0x0, 0x0, 0x0) 22:15:22 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, 0x0) 22:15:22 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xe, 0x0, 0x0, 0x0, 0x0) 22:15:22 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x600, 0x0, 0x0, 0x0) 22:15:22 executing program 0: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:22 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)) [ 291.324341][T16696] QAT: Invalid ioctl 22:15:22 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x700, 0x0, 0x0, 0x0) 22:15:22 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x10, 0x0, 0x0, 0x0, 0x0) 22:15:22 executing program 0: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) [ 291.432438][T16690] __ntfs_error: 52 callbacks suppressed [ 291.432448][T16690] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 291.469004][T16690] ntfs: (device loop3): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 291.519111][T16690] ntfs: (device loop3): ntfs_fill_super(): Not an NTFS volume. [ 291.591315][T16708] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 291.706519][T16708] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:15:23 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) clock_gettime(0x0, &(0x7f0000000180)) 22:15:23 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, 0x0) 22:15:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)) 22:15:23 executing program 0: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:23 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6000000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:23 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x48, 0x0, 0x0, 0x0, 0x0) [ 292.239867][T16720] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 292.240846][T16723] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. [ 292.269086][T16720] ntfs: (device loop3): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 292.283312][T16721] QAT: Invalid ioctl 22:15:23 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:23 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, 0x0) 22:15:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)) [ 292.288174][T16720] ntfs: (device loop3): ntfs_fill_super(): Not an NTFS volume. 22:15:23 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) [ 292.361161][T16723] ntfs: (device loop4): ntfs_fill_super(): Unable to determine device size. 22:15:23 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf23, 0x0, 0x0, 0x0) 22:15:23 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) [ 292.448449][T16734] QAT: Invalid ioctl 22:15:23 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:23 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4c, 0x0, 0x0, 0x0, 0x0) 22:15:23 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6800000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:23 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/qat_adf_ctl\x00', 0x1, 0x0) 22:15:23 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:23 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, 0x0) 22:15:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28001) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:23 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, 0x0) 22:15:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) mq_unlink(&(0x7f0000000100)='/dev/input/event#\x00') r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) accept$unix(r1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000300)={0x3f, {{0x2, 0x4e23, @broadcast}}, 0x1, 0x2, [{{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e24, @empty}}]}, 0x190) 22:15:23 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000100)={0x1, 0x9, 0x99, 0x4, 0x4, 0x8}) 22:15:23 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:23 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, 0x0) 22:15:23 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0), 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:23 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x68, 0x0, 0x0, 0x0, 0x0) 22:15:23 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6c00000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:23 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) mq_unlink(&(0x7f0000000100)='/dev/input/event#\x00') r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) accept$unix(r1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000300)={0x3f, {{0x2, 0x4e23, @broadcast}}, 0x1, 0x2, [{{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e24, @empty}}]}, 0x190) 22:15:23 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, 0x0) 22:15:23 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x14, 0x2}], 0x18) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:23 executing program 0: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) mq_unlink(&(0x7f0000000100)='/dev/input/event#\x00') r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) accept$unix(r1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000300)={0x3f, {{0x2, 0x4e23, @broadcast}}, 0x1, 0x2, [{{0x2, 0x4e20, @loopback}}, {{0x2, 0x4e24, @empty}}]}, 0x190) 22:15:24 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6c, 0x0, 0x0, 0x0, 0x0) 22:15:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x230f, 0x0, 0x0, 0x0) 22:15:24 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) mq_unlink(&(0x7f0000000100)='/dev/input/event#\x00') r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) accept$unix(r1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:24 executing program 0: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, 0x0) 22:15:24 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7400000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:24 executing program 1: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:24 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x74, 0x0, 0x0, 0x0, 0x0) 22:15:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, 0x0) 22:15:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) mq_unlink(&(0x7f0000000100)='/dev/input/event#\x00') syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:24 executing program 0: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:24 executing program 1: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, 0x0) 22:15:24 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a, 0x0, 0x0, 0x0, 0x0) 22:15:24 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a00000000000000, 0x0, 0x0, 0x0, 0x0) 22:15:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, 0x0) 22:15:24 executing program 1: ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) mq_unlink(&(0x7f0000000100)='/dev/input/event#\x00') ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, 0x0) 22:15:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, 0x0) 22:15:24 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:24 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 22:15:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, 0x0) 22:15:24 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:24 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, 0x0) 22:15:24 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, 0x0) 22:15:24 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, 0x0) 22:15:24 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:24 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, 0x0) 22:15:25 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x28001) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, 0x0) 22:15:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3c9, 0x0, 0x0, 0x0, 0x0) 22:15:25 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x97ffffff00000000, 0x0, 0x0, 0x0, 0x0) 22:15:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, 0x0) 22:15:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)) 22:15:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:25 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe0000, 0x0, 0x0, 0x0) 22:15:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3ca, 0x0, 0x0, 0x0, 0x0) 22:15:25 executing program 2: write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x400000, 0x0, 0x0, 0x0) 22:15:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)) 22:15:25 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0) 22:15:25 executing program 2: write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:25 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0) 22:15:25 executing program 2: write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:25 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)) 22:15:25 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, 0x0) 22:15:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3cb, 0x0, 0x0, 0x0, 0x0) 22:15:25 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:25 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xf9fdffff00000000, 0x0, 0x0, 0x0, 0x0) 22:15:25 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, 0x0) 22:15:25 executing program 0: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 22:15:25 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:25 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, 0x0) 22:15:25 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x500, 0x0, 0x0, 0x0, 0x0) 22:15:25 executing program 1: syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000040)=0x1) 22:15:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, 0x0) 22:15:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:26 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x0, 0x0) 22:15:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, 0x0) 22:15:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, 0x0) 22:15:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x600, 0x0, 0x0, 0x0, 0x0) 22:15:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:26 executing program 0: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) 22:15:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, 0x0) 22:15:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, 0x0) 22:15:26 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, 0x0) 22:15:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, 0x0) 22:15:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, 0x0) 22:15:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, 0x0) 22:15:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x700, 0x0, 0x0, 0x0, 0x0) 22:15:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x0, 0x0) 22:15:26 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) mq_unlink(&(0x7f0000000100)='/dev/input/event#\x00') r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) accept$unix(r1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)) 22:15:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:26 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xfdffffff00000000, 0x0, 0x0, 0x0, 0x0) 22:15:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, 0x0) 22:15:26 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) mq_unlink(&(0x7f0000000100)='/dev/input/event#\x00') r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) accept$unix(r1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:26 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xa00, 0x0, 0x0, 0x0, 0x0) 22:15:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:26 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)) 22:15:26 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, 0x0) 22:15:26 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) mq_unlink(&(0x7f0000000100)='/dev/input/event#\x00') r1 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) accept$unix(r1, 0x0, &(0x7f0000000200)) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:26 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:27 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x230f0000, 0x0, 0x0, 0x0) 22:15:27 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffff7f00000000, 0x0, 0x0, 0x0, 0x0) 22:15:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xe00, 0x0, 0x0, 0x0, 0x0) 22:15:27 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, 0x0) 22:15:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f0000000040)) 22:15:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:27 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, 0x0) 22:15:27 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) mq_unlink(&(0x7f0000000100)='/dev/input/event#\x00') syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:27 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0) 22:15:27 executing program 1: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 22:15:27 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, 0x0) 22:15:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xf23, 0x0, 0x0, 0x0, 0x0) 22:15:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:27 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) mq_unlink(&(0x7f0000000100)='/dev/input/event#\x00') ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) [ 296.543684][T17039] __ntfs_error: 134 callbacks suppressed [ 296.543696][T17039] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 296.549850][T17036] ntfs: (device loop1): ntfs_fill_super(): Unable to determine device size. [ 296.565454][T17039] ntfs: (device loop3): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 22:15:27 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, 0x0) 22:15:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) [ 296.618515][T17039] ntfs: (device loop3): ntfs_fill_super(): Not an NTFS volume. [ 296.636416][T17045] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 296.649031][T17045] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. 22:15:27 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) [ 296.680261][T17045] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 22:15:27 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 22:15:27 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, 0x0) 22:15:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:27 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000000c0)={r2, r3}) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000140)=&(0x7f0000000100)) [ 296.830676][T17045] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 22:15:27 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, 0x0) [ 296.876834][T17045] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 296.895868][T17058] ntfs: (device loop3): read_ntfs_boot_sector(): Primary boot sector is invalid. 22:15:27 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, 0x0) 22:15:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000000c0)={r2, r3}) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000140)=&(0x7f0000000100)) 22:15:27 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:27 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, 0x0) 22:15:27 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2, 0x0, 0x0, 0x0) 22:15:27 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:27 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:27 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000000c0)={r2, r3}) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000140)=&(0x7f0000000100)) 22:15:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, 0x0) 22:15:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f00000000c0)={r2, r3}) 22:15:28 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3, 0x0, 0x0, 0x0) 22:15:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1f00, 0x0, 0x0, 0x0, 0x0) 22:15:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, 0x0) 22:15:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280), 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:28 executing program 0: write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:28 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4, 0x0, 0x0, 0x0) 22:15:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)) 22:15:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x97ffffff, 0x0, 0x0, 0x0) 22:15:28 executing program 0: write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280), 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:28 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5, 0x0, 0x0, 0x0) 22:15:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, 0x0) 22:15:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, 0x0) 22:15:28 executing program 0: write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, 0x0) 22:15:28 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6, 0x0, 0x0, 0x0) 22:15:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, r1}) 22:15:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280), 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf9fdffff, 0x0, 0x0, 0x0) 22:15:28 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:28 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7, 0x0, 0x0, 0x0) 22:15:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, 0x0) 22:15:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x0, 0x0) 22:15:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400, 0x0) 22:15:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:28 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa, 0x0, 0x0, 0x0) 22:15:28 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, 0x0) 22:15:28 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe, 0x0, 0x0, 0x0) 22:15:28 executing program 0: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:28 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x230f, 0x0, 0x0, 0x0, 0x0) 22:15:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x2}], 0x83) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) 22:15:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x0, 0x0) 22:15:28 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:28 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x10, 0x0, 0x0, 0x0) 22:15:28 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:28 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) 22:15:28 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, 0x0) 22:15:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, 0x0) 22:15:29 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x48, 0x0, 0x0, 0x0) 22:15:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:29 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c, 0x0, 0x0, 0x0) 22:15:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x0, 0x0) 22:15:29 executing program 1: ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000180)=""/103) 22:15:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 22:15:29 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x60, 0x0, 0x0, 0x0) 22:15:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, 0x0) 22:15:29 executing program 1: ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000180)=""/103) 22:15:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, 0x0) 22:15:29 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x68, 0x0, 0x0, 0x0) 22:15:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, 0x0) 22:15:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:29 executing program 1: ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000180)=""/103) 22:15:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4800, 0x0, 0x0, 0x0, 0x0) 22:15:29 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c, 0x0, 0x0, 0x0) 22:15:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x0, 0x0) 22:15:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) 22:15:29 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x74, 0x0, 0x0, 0x0) 22:15:29 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) 22:15:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, 0x0) 22:15:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) 22:15:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x0) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:29 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) 22:15:29 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a, 0x0, 0x0, 0x0) 22:15:29 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4c00, 0x0, 0x0, 0x0, 0x0) 22:15:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x0, 0x0) 22:15:29 executing program 1: r0 = syz_open_dev$evdev(0x0, 0x2, 0x28001) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) 22:15:29 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x300, 0x0, 0x0, 0x0) 22:15:29 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:29 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14}], 0x83) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) 22:15:29 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x0, 0x0) 22:15:30 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6800, 0x0, 0x0, 0x0, 0x0) 22:15:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x28001) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) 22:15:30 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x500, 0x0, 0x0, 0x0) 22:15:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, 0x0) 22:15:30 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:30 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, 0x0) 22:15:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe000000000000, 0x0, 0x0, 0x0) 22:15:30 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x600, 0x0, 0x0, 0x0) 22:15:30 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6c00, 0x0, 0x0, 0x0, 0x0) 22:15:30 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:30 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) 22:15:30 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xf23, 0x0, 0x0, 0x0, 0x0) 22:15:30 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x700, 0x0, 0x0, 0x0) 22:15:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x0, 0x0) 22:15:30 executing program 0: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 22:15:30 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa00, 0x0, 0x0, 0x0) 22:15:30 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000180)=""/103) 22:15:30 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7400, 0x0, 0x0, 0x0, 0x0) 22:15:30 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe00, 0x0, 0x0, 0x0) 22:15:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x3f000000}], 0x83) 22:15:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 22:15:30 executing program 0: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:30 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000180)=""/103) 22:15:30 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a00, 0x0, 0x0, 0x0, 0x0) 22:15:30 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf23, 0x0, 0x0, 0x0) 22:15:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, 0x0) 22:15:30 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000280)=[{{}, 0x14, 0x0, 0x5000000}], 0x83) 22:15:30 executing program 1: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000180)=""/103) 22:15:30 executing program 0: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:30 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, 0x0) 22:15:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, 0x0) 22:15:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, 0x0) 22:15:30 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1f00, 0x0, 0x0, 0x0) 22:15:30 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:30 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) 22:15:30 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xc903, 0x0, 0x0, 0x0, 0x0) 22:15:30 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, 0x0) 22:15:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, 0x0) 22:15:31 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, 0x0) 22:15:31 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, 0x0) 22:15:31 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) 22:15:31 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, 0x0) 22:15:31 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xca03, 0x0, 0x0, 0x0, 0x0) 22:15:31 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, 0x0) 22:15:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, 0x0) 22:15:31 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, 0x0) 22:15:31 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x230f, 0x0, 0x0, 0x0) 22:15:31 executing program 2: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) 22:15:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, 0x0) 22:15:31 executing program 0 (fault-call:2 fault-nth:0): r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:31 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xcb03, 0x0, 0x0, 0x0, 0x0) 22:15:31 executing program 2: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:31 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, 0x0) [ 300.590801][T17390] FAULT_INJECTION: forcing a failure. [ 300.590801][T17390] name failslab, interval 1, probability 0, space 0, times 0 [ 300.612177][T17390] CPU: 0 PID: 17390 Comm: syz-executor.0 Not tainted 5.1.0-rc4+ #59 [ 300.620284][T17390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.630364][T17390] Call Trace: [ 300.633685][T17390] dump_stack+0x172/0x1f0 [ 300.638052][T17390] should_fail.cold+0xa/0x15 [ 300.642853][T17390] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 300.648690][T17390] ? ___might_sleep+0x163/0x280 [ 300.653670][T17390] __should_failslab+0x121/0x190 [ 300.658631][T17390] should_failslab+0x9/0x14 [ 300.663162][T17390] __kmalloc+0x2dc/0x740 [ 300.667431][T17390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.673967][T17390] ? _parse_integer+0x139/0x190 [ 300.678858][T17390] ? bitmap_alloc+0x27/0x30 [ 300.683389][T17390] bitmap_alloc+0x27/0x30 22:15:31 executing program 2: ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) [ 300.687744][T17390] evdev_handle_get_val+0x3a/0x5b0 [ 300.692883][T17390] ? __lock_acquire+0x548/0x3fb0 [ 300.697939][T17390] evdev_ioctl_handler+0x16ca/0x1c20 [ 300.703283][T17390] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 300.709668][T17390] ? str_to_user+0x90/0x90 [ 300.714198][T17390] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 300.720075][T17390] ? __fget+0x35a/0x550 [ 300.724281][T17390] ? evdev_ioctl_compat+0x30/0x30 [ 300.729639][T17390] evdev_ioctl+0x28/0x30 [ 300.734032][T17390] do_vfs_ioctl+0xd6e/0x1390 [ 300.738652][T17390] ? ioctl_preallocate+0x210/0x210 [ 300.743782][T17390] ? __fget+0x381/0x550 [ 300.747964][T17390] ? ksys_dup3+0x3e0/0x3e0 [ 300.752409][T17390] ? tomoyo_file_ioctl+0x23/0x30 [ 300.757459][T17390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.763803][T17390] ? security_file_ioctl+0x93/0xc0 [ 300.768939][T17390] ksys_ioctl+0xab/0xd0 [ 300.773121][T17390] __x64_sys_ioctl+0x73/0xb0 [ 300.777733][T17390] do_syscall_64+0x103/0x610 [ 300.782351][T17390] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.788282][T17390] RIP: 0033:0x4582f9 [ 300.792260][T17390] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.812120][T17390] RSP: 002b:00007f3d28bdbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 300.820637][T17390] RAX: ffffffffffffffda RBX: 00007f3d28bdbc90 RCX: 00000000004582f9 [ 300.828625][T17390] RDX: 0000000020000000 RSI: 000000008040451a RDI: 0000000000000003 22:15:31 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, 0x0) [ 300.836704][T17390] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 300.844695][T17390] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3d28bdc6d4 [ 300.852861][T17390] R13: 00000000004c02ba R14: 00000000004d2238 R15: 0000000000000004 22:15:31 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) 22:15:31 executing program 0 (fault-call:2 fault-nth:1): r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:31 executing program 2: socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:31 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4800, 0x0, 0x0, 0x0) 22:15:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, 0x0) 22:15:31 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, 0x0) 22:15:31 executing program 2: socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:31 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x230f000000000000, 0x0, 0x0, 0x0) 22:15:31 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c00, 0x0, 0x0, 0x0) 22:15:31 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:32 executing program 2: socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000180)=""/103) 22:15:32 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6000, 0x0, 0x0, 0x0) 22:15:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) 22:15:32 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xe0000, 0x0, 0x0, 0x0, 0x0) 22:15:32 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x2, &(0x7f0000000000)=""/203) 22:15:32 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, 0x0) 22:15:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x2, &(0x7f0000000180)=""/103) 22:15:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) 22:15:32 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6800, 0x0, 0x0, 0x0) 22:15:32 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, 0x0) 22:15:32 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x400000, 0x0, 0x0, 0x0, 0x0) 22:15:32 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x5421, &(0x7f0000000000)=""/203) 22:15:32 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c00, 0x0, 0x0, 0x0) 22:15:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, 0x0) 22:15:32 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, 0x0) 22:15:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x5421, &(0x7f0000000180)=""/103) 22:15:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, 0x0) 22:15:32 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) [ 301.606913][T17453] __ntfs_error: 123 callbacks suppressed [ 301.606924][T17453] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 22:15:32 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7400, 0x0, 0x0, 0x0) 22:15:32 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x5450, &(0x7f0000000000)=""/203) 22:15:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, 0x0) [ 301.656774][T17453] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 301.671635][T17453] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 22:15:32 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:32 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0) 22:15:32 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a00, 0x0, 0x0, 0x0) 22:15:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, 0x0) 22:15:32 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x5450, &(0x7f0000000180)=""/103) 22:15:32 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x5451, &(0x7f0000000000)=""/203) 22:15:32 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x2, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:32 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, 0x0) 22:15:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, 0x0) [ 301.891777][T17482] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 22:15:32 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x5421, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:32 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x5452, &(0x7f0000000000)=""/203) [ 301.952324][T17482] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 301.978945][T17482] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 22:15:32 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe0000, 0x0, 0x0, 0x0) 22:15:32 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, 0x0) [ 302.058879][T17482] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 302.074333][T17482] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 302.126195][T17482] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 22:15:33 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) 22:15:33 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x5451, &(0x7f0000000180)=""/103) 22:15:33 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0) 22:15:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0) 22:15:33 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x5450, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x5460, &(0x7f0000000000)=""/203) 22:15:33 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, 0x0) 22:15:33 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x5451, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x97ffffff00000000, 0x0, 0x0, 0x0) [ 302.296653][T17513] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 22:15:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0) 22:15:33 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x5452, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:33 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, 0x0) 22:15:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x40044581, &(0x7f0000000000)=""/203) 22:15:33 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, 0x0) 22:15:33 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x5452, &(0x7f0000000180)=""/103) 22:15:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf9fdffff00000000, 0x0, 0x0, 0x0) 22:15:33 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, 0x0) 22:15:33 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x5460, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:33 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, 0x0) 22:15:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x0, 0x0) 22:15:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x40044590, &(0x7f0000000000)=""/203) 22:15:33 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8901, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:33 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, 0x0) 22:15:33 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0) 22:15:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x0, 0x0) 22:15:33 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x5460, &(0x7f0000000180)=""/103) 22:15:33 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8902, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:33 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, 0x0) 22:15:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfdffffff00000000, 0x0, 0x0, 0x0) 22:15:33 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, 0x0) 22:15:33 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, 0x0) 22:15:33 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8903, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x40044591, &(0x7f0000000000)=""/203) 22:15:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0) 22:15:33 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x40044581, &(0x7f0000000180)=""/103) 22:15:33 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, 0x0) 22:15:33 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8904, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:33 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) 22:15:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, 0x0) 22:15:34 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8940, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:34 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 22:15:34 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x0, 0x0) 22:15:34 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x400445a0, &(0x7f0000000000)=""/203) 22:15:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x40044590, &(0x7f0000000180)=""/103) 22:15:34 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, 0x0) 22:15:34 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8941, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, 0x0) 22:15:34 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x40049409, &(0x7f0000000000)=""/203) 22:15:34 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, 0x0) 22:15:34 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x2, 0x0) 22:15:34 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x894c, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:34 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x230f0000, 0x0, 0x0, 0x0) 22:15:34 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8980, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xa000000, 0x0, 0x0, 0x0, 0x0) 22:15:34 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x40084503, &(0x7f0000000000)=""/203) 22:15:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x40044591, &(0x7f0000000180)=""/103) 22:15:34 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, 0x0) 22:15:34 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8981, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:34 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 22:15:34 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, 0x0) 22:15:34 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x40084504, &(0x7f0000000000)=""/203) 22:15:34 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8983, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x10000000, 0x0, 0x0, 0x0, 0x0) 22:15:34 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, 0x0) 22:15:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x400445a0, &(0x7f0000000180)=""/103) 22:15:34 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x89a0, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:34 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, 0x0) 22:15:34 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x40104593, &(0x7f0000000000)=""/203) 22:15:34 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4, 0x0) 22:15:34 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x1f000000, 0x0, 0x0, 0x0, 0x0) 22:15:34 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x40049409, &(0x7f0000000180)=""/103) 22:15:34 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x89a1, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:34 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x60000000, 0x0, 0x0, 0x0) 22:15:35 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x4020940d, &(0x7f0000000000)=""/203) 22:15:35 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0) 22:15:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, 0x0) 22:15:35 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x40049409, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, 0x0) 22:15:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, 0x0) 22:15:35 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x4020940d, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:35 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x6, 0x0) 22:15:35 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x40284504, &(0x7f0000000000)=""/203) 22:15:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x40084503, &(0x7f0000000180)=""/103) 22:15:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, 0x0) 22:15:35 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0xc0045878, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, 0x0) 22:15:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, 0x0) 22:15:35 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0xc0045878, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:35 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x80044501, &(0x7f0000000000)=""/203) 22:15:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, 0x0) 22:15:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x40084504, &(0x7f0000000180)=""/103) 22:15:35 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) 22:15:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x97ffffff, 0x0, 0x0, 0x0) 22:15:35 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0xc0189436, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x230f0000, 0x0, 0x0, 0x0, 0x0) 22:15:35 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x80044584, &(0x7f0000000000)=""/203) 22:15:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, 0x0) 22:15:35 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0xc020660b, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x40104593, &(0x7f0000000180)=""/103) 22:15:35 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xa, 0x0) 22:15:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, 0x0) 22:15:35 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'\x02\x00\x00\x00aller0\x00'}) 22:15:35 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x80084502, &(0x7f0000000000)=""/203) 22:15:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xf9fdffff, 0x0, 0x0, 0x0) 22:15:35 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, 0x0) 22:15:35 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x0, 0x0) 22:15:35 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'\x03\x00\x00\x00aller0\x00'}) 22:15:35 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x4020940d, &(0x7f0000000180)=""/103) 22:15:36 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x80084503, &(0x7f0000000000)=""/203) 22:15:36 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0xe, 0x0) 22:15:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, 0x0) 22:15:36 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'\x06\x00\x00\x00aller0\x00'}) 22:15:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfdffffff, 0x0, 0x0, 0x0) 22:15:36 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'\a\x00\x00\x00aller0\x00'}) 22:15:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x40000000, 0x0, 0x0, 0x0, 0x0) 22:15:36 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x40284504, &(0x7f0000000180)=""/103) 22:15:36 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x80084504, &(0x7f0000000000)=""/203) 22:15:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, 0x0) 22:15:36 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'\b\x00\x00\x00aller0\x00'}) 22:15:36 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x10, 0x0) 22:15:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x0, 0x0) 22:15:36 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'\t\x00\x00\x00aller0\x00'}) 22:15:36 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x80104592, &(0x7f0000000000)=""/203) 22:15:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x48000000, 0x0, 0x0, 0x0, 0x0) 22:15:36 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80044501, &(0x7f0000000180)=""/103) 22:15:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, 0x0) 22:15:36 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) r1 = getuid() r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000100)=@nat={'nat\x00', 0x1b, 0x5, 0x5c0, 0x138, 0x0, 0x248, 0x138, 0x388, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x5, &(0x7f0000000080), {[{{@ipv6={@remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}, [0xff000000, 0xff, 0xffffffff, 0xff], [0xffffff00, 0xff000000, 0xff000000, 0xffffff00], 'lapb0\x00', 'veth1_to_hsr\x00', {0xff}, {}, 0x8, 0x401, 0x7, 0x20}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x6, 0x4da4390a}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x1, @ipv4=@multicast2, @ipv6=@local, @icmp_id=0x68, @icmp_id=0x64}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x10, @ipv4=@local, @ipv4=@empty, @icmp_id=0x68, @icmp_id=0x66}}}, {{@ipv6={@remote, @mcast2, [0x0, 0x0, 0xff, 0xffffffff], [0x0, 0xffffff00, 0x0, 0xffffffff], 'bridge_slave_1\x00', 'hsr0\x00', {0xff}, {0xff}, 0x3e, 0x6, 0x6, 0x20}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x4d6, 0x4d2, 0xfffffffffffff745, 0x2, 0x3}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x1a, @ipv4=@multicast2, @ipv6=@local, @gre_key=0x40, @icmp_id=0x65}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0xbf, 0x7, 0xf800000000000, 0x1, 0x1, 0x205, 0x80}}, @common=@hl={0x28, 'hl\x00', 0x0, {0x1, 0x8001}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0xd, @ipv6=@mcast2, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}, @port=0x4e24, @icmp_id=0x66}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) setuid(r1) 22:15:36 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x48, 0x0) 22:15:36 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x80284504, &(0x7f0000000000)=""/203) 22:15:36 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'s\x05\xe8\x0f\x00\x00\x83\x1b\xe4\xc5\n\x00'}) syz_open_dev$rtc(&(0x7f0000000080)='/dev/rtc#\x00', 0x69, 0x488900) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x43f5) 22:15:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, 0x0) 22:15:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4c000000, 0x0, 0x0, 0x0, 0x0) 22:15:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, 0x0) 22:15:36 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80044584, &(0x7f0000000180)=""/103) 22:15:36 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000000)={'syzkaller0\x00'}) 22:15:36 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x4c, 0x0) 22:15:36 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0xc0045878, &(0x7f0000000000)=""/203) 22:15:36 executing program 2: syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x800) r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) 22:15:36 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xffffff97, 0x0, 0x0, 0x0) 22:15:36 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x68000000, 0x0, 0x0, 0x0, 0x0) 22:15:37 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084503, &(0x7f0000000180)=""/103) 22:15:37 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x68, 0x0) 22:15:37 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, 0x0) 22:15:37 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0xc0045878, &(0x7f0000000000)=""/203) 22:15:37 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = socket(0x8, 0x5, 0x3) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000000140)={0x0, 0x5}, 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000), 0x10) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000080)={'ip6gre0\x00', {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}) prctl$PR_GET_KEEPCAPS(0x7) 22:15:37 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xfffffffd, 0x0, 0x0, 0x0) 22:15:37 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x6c000000, 0x0, 0x0, 0x0, 0x0) 22:15:37 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) r1 = getpgid(0xffffffffffffffff) ioprio_get$pid(0x2, r1) 22:15:37 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0xc0189436, &(0x7f0000000000)=""/203) 22:15:37 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80084504, &(0x7f0000000180)=""/103) 22:15:37 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x0, 0x0) 22:15:37 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x6c, 0x0) 22:15:37 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, 0x0) 22:15:37 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x800) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000140)={{0x8726, 0x9}, {0x9, 0xfbf}, 0x9, 0x7, 0x100}) pipe2(&(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000840)={0x0, @in6={{0xa, 0x4e21, 0x5, @remote, 0x5}}, 0x2, 0x0, 0x1, 0x8, 0x9}, &(0x7f0000000080)=0xfffffeea) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x703000, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f00000001c0), &(0x7f0000000200)=0x4) ioctl$VIDIOC_TRY_DECODER_CMD(r3, 0xc0485661, &(0x7f00000000c0)={0x7, 0x1, @start={0x8001}}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000940)={r4, 0x9, 0x20}, &(0x7f0000000980)=0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$VIDIOC_S_FBUF(r3, 0x4030560b, &(0x7f0000000380)={0xa, 0x11, &(0x7f0000000280)="972939dad2482c0ec51b6770f941617c5aa2156d6f5adae33dfbe425facb5d7d9d2e60e36ab0ad8f37553ccc02828470d1ff653be001a9d5b60943f9fb3fee0d63612dc691c5deda36ee9d53a0a217a154ec9312db4e2dc98e56255ab88992559c31925db004a7d637743eb11ed52748fd200cce3006bfdcd3b0d0b3679c05723f1d0ad15a444da67d78db5ccd039fef58ac69a1a725453ec6fc0bcf6ab5a6ee47e9cfd37e43f8e9bfb250d4b92dd254746938f1092c90442c9509a2e21f846a8790ed0bb0ff113f2d29455368a9812a1f17c21cb4d6a2c13bc1b576e2fb87", {0x1f, 0x7, 0x0, 0x7, 0x0, 0x238, 0x2, 0x2}}) 22:15:37 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0xc020660b, &(0x7f0000000000)=""/203) [ 306.609815][T17891] __ntfs_error: 123 callbacks suppressed [ 306.609826][T17891] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 306.628955][T17891] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 306.686499][T17891] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 22:15:37 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xe000000000000, 0x0, 0x0, 0x0) 22:15:37 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80104592, &(0x7f0000000180)=""/103) 22:15:37 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'team_slave_1\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="1300ff000000000000522672ad"]}) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x200) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000001240)={[{0x0, 0x51, 0xfffffffffffffffc, 0x7, 0x101, 0x1ff, 0xffffffffffffff81, 0x7fff, 0x2, 0xbd90, 0x4ee7, 0x1ff, 0x6}, {0xffffffffffff8000, 0x1, 0x4, 0x8, 0x1f, 0x3, 0x2, 0x5, 0x4800, 0xde2, 0x7, 0xbd2, 0x10000}, {0x5, 0x6, 0x2, 0xff, 0xff, 0x4, 0x8000, 0x100, 0x6, 0x8000, 0x1, 0x8d5, 0x9}], 0x2443}) recvfrom$rxrpc(r1, &(0x7f0000000140)=""/4096, 0x1000, 0x10060, &(0x7f0000001140)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}}, 0x24) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000100)={0x9, 0x5, 0x9, 0x44, 0x0, 0xffffffffffffffff, 0x8}) ioctl$SIOCAX25GETINFO(r1, 0x89ed, &(0x7f0000001180)) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000001200)) [ 306.806300][T17891] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. [ 306.849023][T17891] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 306.869435][T17891] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 22:15:37 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x74000000, 0x0, 0x0, 0x0, 0x0) 22:15:37 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x74, 0x0) 22:15:37 executing program 0: syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x100, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000000)={0x0, 0x2}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000080)={r2, 0x27, "60a8c72acb764f6a8ffc50f88f9aa9af02af4474e0e9769adcbca7a95bdc8938f0ed875bb3d0e7"}, &(0x7f00000000c0)=0x2f) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x8001) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f0000004400)={0x0, 0x0, 0x2080}) 22:15:37 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 22:15:37 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 22:15:37 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x181044, 0x0) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x0, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={'nr', 0x0}, 0x7f, 'syz0\x00', @null, 0x1f, 0x7, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default]}) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000000)={r1, 0x1, 0x1000000, 0xfffff000}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB="1df16a34d83f4c050000005e2bd2", @ANYRES16=r2, @ANYBLOB="200029bd7000fddbdf250c15d28f792eb25dc8ffff7f08000600ff0700001b0002000800040009000000080009000200000008000400010100000800050000958000"], 0x48}, 0x1, 0x0, 0x0, 0x200000c1}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000180)={'ip6erspan0\x00'}) 22:15:37 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0x80284504, &(0x7f0000000180)=""/103) 22:15:38 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x101000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000140)={{0x6a2bd6ed4cb92945, 0x1, 0x56e8, 0x1, 0xe13c}}) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000000)=""/203) [ 307.109672][T17922] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 22:15:38 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, 0x0) [ 307.148994][T17922] ntfs: (device loop4): read_ntfs_boot_sector(): Mount option errors=recover not used. Aborting without trying to recover. [ 307.180772][T17922] ntfs: (device loop4): ntfs_fill_super(): Not an NTFS volume. 22:15:38 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, 0x0) 22:15:38 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x7a, 0x0) 22:15:38 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/psched\x00') ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000000100)={r0, r0, 0x10001, 0x5c, &(0x7f0000000080)="4488fadd84c781d260495c94d6d2c8edd8859a7da425e24cf1307b71ec20cd56eec918e8b3a1fd723ec38bb30ceb1dde0d730ecaf8c7f0b87ba85d0908fb0d178b80943117737242dd62a3f0caf25d7a01c5e663f078d5bc7d227420", 0xbd8, 0x3, 0x9, 0x6, 0xf23, 0x2, 0x7, 'syz1\x00'}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f00000001c0)={0x7fff, 0x0, 0x10000, 0x5}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000200)={0x6, r2}) ioctl$sock_SIOCETHTOOL(r0, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) [ 307.250886][T17922] ntfs: (device loop4): read_ntfs_boot_sector(): Primary boot sector is invalid. 22:15:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x7a000000, 0x0, 0x0, 0x0, 0x0) 22:15:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0xc0045878, &(0x7f0000000180)=""/103) 22:15:38 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x4000, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000140)={0x1, 0x0, {0x3ff, 0x8000, 0x100a, 0x7, 0xf, 0x5, 0x75d73acc2d4b5749, 0x7}}) 22:15:38 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, 0x0) 22:15:38 executing program 2: r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'veth0_to_team\x00', {0x2, 0x4e21, @local}}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x6, 0x8040) ioctl$KVM_SET_TSC_KHZ(r2, 0xaea2, 0x9) 22:15:38 executing program 0: r0 = eventfd(0x8000000000000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000340)) r1 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r1, 0x0, 0xfffffffffffffee2) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f0000000200)={'filter\x00', 0x0, 0x4, 0x4e, [], 0x4, &(0x7f0000000140)=[{}, {}, {}, {}], &(0x7f0000000180)=""/78}, &(0x7f0000000280)=0x78) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f0000000580)=""/203) ioctl$FIGETBSZ(r3, 0x2, &(0x7f0000000300)) 22:15:38 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x300, 0x0) 22:15:38 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000240), &(0x7f00000002c0)=0x68) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCETHTOOL(r1, 0x8982, &(0x7f0000000040)={'syzkaller0\x00'}) io_setup(0x9, &(0x7f0000000000)=0x0) io_submit(r2, 0x1, &(0x7f0000000200)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2, 0x3, r1, &(0x7f0000000080)="f7010cbe4f7c2874d212e5977b0e7836ec394a83b040df9f4201039336301dd0505123b5fab113fb75523746b1b1aa8208fb33fb460df3be10fb2bf8bab351e5cd3a06e37e9b72f31cb9d323be21a30f36775d96b6dc63d5014b500172b3fa86932a7c4af5c6ab4a78129a90b06b5a546b36fc810a756b15e27c0af2aad12b513e16b9ad2b00f102dfcd1babfcb838ab15e4f46409d29552a449a98b762083d5b683c4b5c5f8b70d839e549b7d91cd4cd75860f1a4a9bd4897e7dca9eeac441d4607bf9ad3b62c90f4a5e48f3c18bc53028ba188053c43ca3024dd854abbbc9c330360a71d44a4f3694364de7f44c7124724061a5b2712f4b6", 0xf9, 0xde, 0x0, 0x3}]) 22:15:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0xc0045878, &(0x7f0000000180)=""/103) 22:15:38 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, 0x0) 22:15:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, 0x0) 22:15:38 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, 0x0) 22:15:38 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x2040, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x3, 0x5}, {0x100, 0x7ff}]}) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) 22:15:38 executing program 5: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x500, 0x0) 22:15:38 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, 0x0) 22:15:38 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGID(r0, 0xc0189436, &(0x7f0000000180)=""/103) 22:15:38 executing program 0: r0 = syz_open_dev$evdev(&(0x7f00000002c0)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/203) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x2000, 0x1c0) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4102}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000001d00130c2cbd7000ffdbdf251e00000008001200e2000000"], 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x40000) openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) 22:15:38 executing program 4: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, 0x0) 22:15:38 executing program 3: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) [ 468.448994][ T1042] INFO: task syz-executor.2:17968 blocked for more than 143 seconds. [ 468.457421][ T1042] Not tainted 5.1.0-rc4+ #59 [ 468.468149][ T1042] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 468.477147][ T1042] syz-executor.2 D28480 17968 7897 0x80000000 [ 468.489430][ T1042] Call Trace: [ 468.492783][ T1042] __schedule+0x817/0x1cc0 [ 468.497215][ T1042] ? trace_hardirqs_off+0x62/0x220 [ 468.507923][ T1042] ? kasan_check_read+0x11/0x20 [ 468.514309][ T1042] ? __sched_text_start+0x8/0x8 [ 468.524107][ T1042] ? __lock_acquire+0x548/0x3fb0 [ 468.530893][ T1042] schedule+0x92/0x180 [ 468.534997][ T1042] schedule_timeout+0x8ca/0xfd0 [ 468.544797][ T1042] ? wait_for_completion+0x294/0x440 [ 468.551290][ T1042] ? find_held_lock+0x35/0x130 [ 468.556177][ T1042] ? usleep_range+0x170/0x170 [ 468.566613][ T1042] ? kasan_check_write+0x14/0x20 [ 468.572757][ T1042] ? _raw_spin_unlock_irq+0x28/0x90 [ 468.577979][ T1042] ? wait_for_completion+0x294/0x440 [ 468.588348][ T1042] ? _raw_spin_unlock_irq+0x28/0x90 [ 468.594730][ T1042] ? lockdep_hardirqs_on+0x418/0x5d0 [ 468.604930][ T1042] ? trace_hardirqs_on+0x67/0x230 [ 468.611213][ T1042] ? kasan_check_read+0x11/0x20 [ 468.616114][ T1042] wait_for_completion+0x29c/0x440 [ 468.626267][ T1042] ? lockdep_hardirqs_on+0x418/0x5d0 [ 468.632723][ T1042] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 468.644148][ T1042] ? wake_up_q+0xf0/0xf0 [ 468.648438][ T1042] ? percpu_ref_kill_and_confirm+0x1b7/0x3b0 [ 468.655653][ T1042] exit_aio+0x321/0x3a0 [ 468.664757][ T1042] ? aio_poll_wake+0x11e0/0x11e0 [ 468.670860][ T1042] ? mutex_unlock+0xd/0x10 [ 468.675301][ T1042] mmput+0xcf/0x4c0 [ 468.684098][ T1042] do_exit+0x816/0x2fa0 [ 468.688307][ T1042] ? get_signal+0x331/0x1d50 [ 468.696892][ T1042] ? mm_update_next_owner+0x640/0x640 [ 468.707248][ T1042] ? kasan_check_write+0x14/0x20 [ 468.713407][ T1042] ? _raw_spin_unlock_irq+0x28/0x90 [ 468.718621][ T1042] ? get_signal+0x331/0x1d50 [ 468.728131][ T1042] ? _raw_spin_unlock_irq+0x28/0x90 [ 468.735425][ T1042] do_group_exit+0x135/0x370 [ 468.750431][ T1042] get_signal+0x399/0x1d50 [ 468.754933][ T1042] do_signal+0x87/0x1940 [ 468.763168][ T1042] ? kasan_check_read+0x11/0x20 [ 468.768074][ T1042] ? _copy_to_user+0xc9/0x120 [ 468.775907][ T1042] ? setup_sigcontext+0x7d0/0x7d0 [ 468.784970][ T1042] ? exit_to_usermode_loop+0x43/0x2c0 [ 468.792459][ T1042] ? do_syscall_64+0x52d/0x610 [ 468.797287][ T1042] ? exit_to_usermode_loop+0x43/0x2c0 [ 468.806820][ T1042] ? lockdep_hardirqs_on+0x418/0x5d0 [ 468.814327][ T1042] ? trace_hardirqs_on+0x67/0x230 [ 468.824140][ T1042] exit_to_usermode_loop+0x244/0x2c0 [ 468.831717][ T1042] do_syscall_64+0x52d/0x610 [ 468.836383][ T1042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 468.846324][ T1042] RIP: 0033:0x4582f9 [ 468.856591][ T1042] Code: Bad RIP value. [ 468.864701][ T1042] RSP: 002b:00007f8a6d7ffcf8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 468.875533][ T1042] RAX: 0000000000000001 RBX: 000000000073bfa8 RCX: 00000000004582f9 [ 468.887757][ T1042] RDX: 00000000004bf457 RSI: 0000000000000081 RDI: 000000000073bfac [ 468.898465][ T1042] RBP: 000000000073bfa0 R08: 0000000000000016 R09: 0000000000000000 [ 468.912681][ T1042] R10: ffffffffffffffff R11: 0000000000000246 R12: 000000000073bfac [ 468.922858][ T1042] R13: 00007ffe0365a45f R14: 00007f8a6d8009c0 R15: 000000000073bfac [ 468.935072][ T1042] [ 468.935072][ T1042] Showing all locks held in the system: [ 468.945175][ T1042] 1 lock held by khungtaskd/1042: [ 468.955085][ T1042] #0: 00000000481a8a53 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 468.966586][ T1042] 1 lock held by rsyslogd/7742: [ 468.975472][ T1042] #0: 000000007cc8687e (&f->f_pos_lock){+.+.}, at: __fdget_pos+0xee/0x110 [ 468.986507][ T1042] 2 locks held by getty/7855: [ 468.995252][ T1042] #0: 00000000b4a36c69 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 469.006419][ T1042] #1: 00000000b6e8912e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 469.022138][ T1042] 2 locks held by getty/7856: [ 469.026856][ T1042] #0: 000000000369cd61 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 469.038148][ T1042] #1: 000000002fc4d7a8 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 469.053868][ T1042] 2 locks held by getty/7857: [ 469.058587][ T1042] #0: 000000009b0fd9f6 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 469.067996][ T1042] #1: 0000000047dc2194 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 469.084353][ T1042] 2 locks held by getty/7858: [ 469.089306][ T1042] #0: 0000000078a57357 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 469.098277][ T1042] #1: 000000006f631220 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 469.113955][ T1042] 2 locks held by getty/7859: [ 469.118672][ T1042] #0: 000000005cbe9bc9 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 469.127908][ T1042] #1: 000000001b898d8e (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 469.143481][ T1042] 2 locks held by getty/7860: [ 469.148217][ T1042] #0: 00000000f4a621a8 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 469.158410][ T1042] #1: 00000000de730c9d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 469.173929][ T1042] 2 locks held by getty/7861: [ 469.178645][ T1042] #0: 0000000020f12ebb (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 469.187880][ T1042] #1: 00000000c4ae4ebf (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 469.203428][ T1042] [ 469.205854][ T1042] ============================================= [ 469.205854][ T1042] [ 469.216536][ T1042] NMI backtrace for cpu 0 [ 469.221360][ T1042] CPU: 0 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc4+ #59 [ 469.229335][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.239639][ T1042] Call Trace: [ 469.243200][ T1042] dump_stack+0x172/0x1f0 [ 469.247593][ T1042] nmi_cpu_backtrace.cold+0x63/0xa4 [ 469.253082][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 469.259720][ T1042] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 469.265735][ T1042] arch_trigger_cpumask_backtrace+0x14/0x20 [ 469.271647][ T1042] watchdog+0x9b7/0xec0 [ 469.275826][ T1042] kthread+0x357/0x430 [ 469.279912][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 469.285472][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 469.291731][ T1042] ret_from_fork+0x3a/0x50 [ 469.296304][ T1042] Sending NMI from CPU 0 to CPUs 1: [ 469.301974][ C1] NMI backtrace for cpu 1 [ 469.301980][ C1] CPU: 1 PID: 3876 Comm: udevd Not tainted 5.1.0-rc4+ #59 [ 469.301987][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.301991][ C1] RIP: 0010:__sanitizer_cov_trace_pc+0x1/0x50 [ 469.302003][ C1] Code: 25 64 6c ec 08 41 bc f4 ff ff ff e8 8d 5e ea ff 48 c7 05 4e 6c ec 08 00 00 00 00 e9 a4 e9 ff ff 90 90 90 90 90 90 90 90 90 55 <48> 89 e5 48 8b 75 08 65 48 8b 04 25 00 ee 01 00 65 8b 15 78 5e 91 [ 469.302007][ C1] RSP: 0018:ffff8880986ffcd0 EFLAGS: 00000202 [ 469.302015][ C1] RAX: 0000000000000000 RBX: ffff88809876a340 RCX: ffffffff81c4a9fd [ 469.302021][ C1] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 0000000000000005 [ 469.302026][ C1] RBP: ffff8880986ffe98 R08: ffff8880986f2500 R09: ffffed1013123419 [ 469.302031][ C1] R10: ffffed1013123418 R11: ffff88809891a0c3 R12: 1ffff110130dffa6 [ 469.302036][ C1] R13: 0000000000000001 R14: 0000000000000bb8 R15: 00000000ffffffea [ 469.302042][ C1] FS: 00007fb3444e67a0(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 469.302047][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 469.302052][ C1] CR2: 000000c4296f9000 CR3: 00000000985a1000 CR4: 00000000001406e0 [ 469.302057][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 469.302062][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 469.302065][ C1] Call Trace: [ 469.302068][ C1] ? ep_poll+0x144/0xe50 [ 469.302072][ C1] ? _raw_spin_unlock_irq+0x28/0x90 [ 469.302076][ C1] ? finish_task_switch+0x146/0x780 [ 469.302080][ C1] ? _raw_spin_unlock_irq+0x28/0x90 [ 469.302083][ C1] ? ep_modify+0x8e0/0x8e0 [ 469.302087][ C1] ? _raw_spin_unlock_irq+0x5e/0x90 [ 469.302091][ C1] ? finish_task_switch+0x146/0x780 [ 469.302095][ C1] ? finish_task_switch+0x118/0x780 [ 469.302098][ C1] ? __switch_to_asm+0x34/0x70 [ 469.302102][ C1] ? __switch_to_asm+0x40/0x70 [ 469.302105][ C1] ? __schedule+0x81f/0x1cc0 [ 469.302110][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 469.302113][ C1] ? __fget_light+0x1a9/0x230 [ 469.302117][ C1] do_epoll_wait+0x1b3/0x200 [ 469.302120][ C1] __x64_sys_epoll_wait+0x97/0xf0 [ 469.302124][ C1] do_syscall_64+0x103/0x610 [ 469.302128][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 469.302132][ C1] RIP: 0033:0x7fb343bfa943 [ 469.302143][ C1] Code: 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 90 90 90 90 90 90 83 3d b5 dc 2a 00 00 75 13 49 89 ca b8 e8 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 34 c3 48 83 ec 08 e8 3b c4 00 00 48 89 04 24 [ 469.302147][ C1] RSP: 002b:00007fff1469a3e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e8 [ 469.302156][ C1] RAX: ffffffffffffffda RBX: 0000000000000bb8 RCX: 00007fb343bfa943 [ 469.302161][ C1] RDX: 0000000000000008 RSI: 00007fff1469a4e0 RDI: 000000000000000a [ 469.302166][ C1] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000001 [ 469.302172][ C1] R10: 0000000000000bb8 R11: 0000000000000246 R12: 0000000000000003 [ 469.302177][ C1] R13: 0000000000000000 R14: 0000000000b1c550 R15: 0000000000b14250 [ 469.312405][ T1042] Kernel panic - not syncing: hung_task: blocked tasks [ 469.602015][ T1042] CPU: 0 PID: 1042 Comm: khungtaskd Not tainted 5.1.0-rc4+ #59 [ 469.609564][ T1042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 469.619638][ T1042] Call Trace: [ 469.622962][ T1042] dump_stack+0x172/0x1f0 [ 469.627322][ T1042] panic+0x2cb/0x65c [ 469.631248][ T1042] ? __warn_printk+0xf3/0xf3 [ 469.635853][ T1042] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 469.641531][ T1042] ? ___preempt_schedule+0x16/0x18 [ 469.646690][ T1042] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 469.652859][ T1042] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 469.659021][ T1042] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 469.665191][ T1042] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 469.671375][ T1042] watchdog+0x9c8/0xec0 [ 469.675550][ T1042] kthread+0x357/0x430 [ 469.679629][ T1042] ? reset_hung_task_detector+0x30/0x30 [ 469.685182][ T1042] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 469.691455][ T1042] ret_from_fork+0x3a/0x50 [ 469.696983][ T1042] Kernel Offset: disabled [ 469.701531][ T1042] Rebooting in 86400 seconds..